Hacking cryptographic protocols with Tensor Network attacks | Publicación