There are several techniques to danger modeling. Deciding on the ideal methodology starts using a further knowledge of the process of menace modeling. Different attack models are used for other cryptographic primitives, or even more generally for all form of stability systems. Illustrations for this sort of attack models are: https://ieeexplore.ieee.org/document/9941250