“…As the second dimension, we have tried to introduce the boundary of well-known standard attacks against the main cryptographic primitives, Encryption, Digital Signature and key Agreement. Finally, the last dimension introduces possible challenges for the future researches over cryptosystems especially lightweight and/or provably secure ones by expanding what investigated in [7] to cover more variety of cryptographic protocols.…”