In this post we will explain the core idea behind a recently published attack against one kind of key exchange protocol. Specifically, we will discuss "signal leakage attacks" against key exchange protocols, which are based on the Learning with Errors (LWE) problem under "key re-use".