Applications
Security properties and analyses of specific applications
Threema
Cryptanalysis uncovering 7 attacks from 3 different vectors
Attack models employed:
- Network Attacker
- Compromised Server
- Compelled Access
Cryptanalysis uncovering 7 attacks from 3 different vectors
Attack models employed: