Provable Security at Implementation-level by