Watch this video on YouTube
In which of the following cryptographic threat models does the attacker have the greatest control over a cryptosystem that they are attacking?