The following publications are possibly variants of this publication:
- Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal LeakageJintai Ding, Scott R. Fluhrer, Saraswathy RV. acisp 2018: 467-486 [doi]
- Leakage of Signal function with reused keys in RLWE key exchangeJintai Ding, Saed Alsayigh, Saraswathy RV, Scott R. Fluhrer. iacr, 2016:1176, 2016. [doi]
- Leakage of signal function with reused keys in RLWE key exchangeJintai Ding, Saed Alsayigh, R. V. Saraswathy, Scott R. Fluhrer, Xiaodong Lin. icc 2017: 1-6 [doi]
- Practical Randomized RLWE-Based Key Exchange Against Signal Leakage AttackXinwei Gao, Jintai Ding, Lin Li, Jiqiang Liu. TC, 67(11):1584-1593, 2018. [doi]
- Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE AssumptionJintai Ding, Pedro Branco 0005, Kevin Schmitt. iacr, 2019:665, 2019. [doi]
- Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key ExchangeYue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding. esorics 2022: 677-697 [doi]
- Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key ExchangeYue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding. iacr, 2022:131, 2022. [doi]