A Critical Study of Composition Algorithms in Differential Privacy