Sections 3 and 5.1 explain the main parts of the attack in significant enough detail to get an idea of how it works. It's about 3 pages of text.
A one line explanation from section 7.1, after you get past the part where speculative execution is involved and before setting up the side channel to read from kernel addressible memory (everything):