This document discusses recovering an RSA private key from a TLS session using a side channel attack that exploits the RSA-CRT optimization. It begins with background on side channel attacks and an overview of the roadmap. It then discusses how RSA signatures work, the RSA-CRT optimization, and how a fault during signature generation using RSA-CRT can leak a private key factor. The document demonstrates checking for faulty signatures in TLS and recovering the private key. It notes the attack requires RSA-CRT, signatures on known values, and a faulty signature.