Thought this could be interesting: [1]http://thehackernews.com/2013/12/acoustic-cryptanalysis-extracting-r sa.html Paper: [2]http://www.tau.ac.il/~tromer/papers/acoustic-20131218.pdf References 1. http://thehackernews.com/2013/12/acoustic-cryptanalysis-extracting-rsa.html 2. http://www.tau.ac.il/~tromer/papers/acoustic-20131218.pdf