Academics like to write papers, and they employ themselves this way, with grant money from where ever they can get it.
This type of research takes months, maybe years, and culminates in the linked paper, and frankly I find it interesting as well as useful research.
It may not work outside of a controlled environment, but rest-assured they have researched it and it works, and then it's worth publishing.
I do find it interesting that they can gain insight into the victims private RSA key using their techniques... which is to send chosen text to the victim encrypted with the victim's public key, and have them open it (i.e. email) and decrypt it with their private key, then listen to the PC to gain insight into the private key to feed to their cryptoanalysis. The goal is to reduce the search space, and they seem to have been able to do that.
So maybe the TV shows where the secret agent puts his secret device near the bad-guy's PC and can get a password in real time is not science fiction after all