Well, where "the same issues" means "timing side channels". Kario's blog post and related materials are worth reading in full, if you're interested in cryptography, and his point that we need to pay more attention to timing side-channel attacks in general, and not just for RSA, is well taken. But at the moment there's no published timing-channel attack similar to Marvin against other asymmetric-key ciphers, or even (IIRC) against RSA with OAEP.
Another key takeaway from Marvin, by the way, is this sentence from Kario's FAQ: "In other words, we got results because we were thorough, not because we used novel techniques." In particular, his team tested across the entire TLS handshake, and they gathered a lot of data, and they used better statistical tests that did not rely on assumptions which are invalid in practice in this case. (More details available on Kario's page and in the paper.)