Hacking Cryptographic Protocols with Tensor Network Attacks | Publicación