On computational intractability assumptions in cryptography