Recent efforts in the research community have focused on computer-aided cryptography, where formal methods are introduced to provide formal guarantees of the correctness of cryptographic proofs, security properties of cryptographic protocols, the correctness of software implementations of cryptographic specifications, and the absence of side-channel vulnerabilities in software implementations of cryptographic specifications.