Some common attack models are:
Different attack models are used for other cryptographic primitives, or more generally for all kind of security systems. Examples for such attack models are:
Information Security Laboratory (powerpoint) https://web.archive.org/web/20060902081253/http://islab.oregonstate.edu/koc/ece575/notes/L2.ppt ↩
Bruce Schneier (2000). "Cryptography". Secrets & Lies: Digital Security in a Networked World (Hardcover ed.). Wiley Computer Publishing Inc. pp. 90–91. ISBN 0-471-25311-1. 0-471-25311-1 ↩
Gordon Welchman, The Hut Six Story: Breaking the Enigma Codes, p. 78. /wiki/Gordon_Welchman ↩
Michael Smith, "How It Began: Bletchley Park Goes to War," in B. Jack Copeland, ed., Colossus: The Secrets of Bletchley Park's Codebreaking Computers. /wiki/B._Jack_Copeland ↩
Elena Andreeva; Andrey Bogdanov; Bart Mennink (8 July 2014). Towards Understanding the Known-Key Security of Block Ciphers. FSE 2014. https://eprint.iacr.org/2015/222 ↩