How to Provably Leverage Time in Cryptography