S. Mário, M. E. Alvim, K. Andrés, P. Chatzikokolakis, C. Degano et al., Differential privacy: on the trade-off between utility and information leakage, 2011.

S. Mário, K. Alvim, and . Chatzikokolakis, Pierpaolo Degano, and Catuscia Palamidessi. Differential privacy versus quantitative information flow, 2010.

G. Barthe and B. Köpf, Information-Theoretic Bounds for Differentially Private Mechanisms, 2011 IEEE 24th Computer Security Foundations Symposium, 2011.
DOI : 10.1109/CSF.2011.20

C. Braun, K. Chatzikokolakis, and C. Palamidessi, Quantitative Notions of Leakage for One-try Attacks, Proc. of MFPS, pp.75-91, 2009.
DOI : 10.1016/j.entcs.2009.07.085

URL : https://hal.archives-ouvertes.fr/inria-00424852

C. Cachin, Entropy Measures and Unconditional Security in Cryptography, 1997.

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Anonymity protocols as noisy channels, Information and Computation, vol.206, issue.2-4, pp.378-401, 2008.
DOI : 10.1016/j.ic.2007.07.003

URL : https://hal.archives-ouvertes.fr/inria-00349225

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, On the Bayes risk in information-hiding protocols, Journal of Computer Security, vol.16, issue.5, pp.531-571, 2008.
DOI : 10.3233/JCS-2008-0333

URL : https://hal.archives-ouvertes.fr/inria-00349224

D. Chaum, The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988.
DOI : 10.1007/BF00206326

D. Clark, S. Hunt, and P. Malacaria, Quantitative Information Flow, Relations and Polymorphic Types, Journal of Logic and Computation, vol.15, issue.2, pp.181-199, 2005.
DOI : 10.1093/logcom/exi009

M. R. Clarkson and F. B. Schneider, Quantification of integrity, 2011.

Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, SIAM Journal on Computing, vol.38, issue.1, pp.97-139, 2008.
DOI : 10.1137/060651380

C. Dwork, Differential Privacy, Automata, Languages and Programming, 33rd Int. Colloquium Proc., Part II, pp.1-12, 2006.
DOI : 10.1007/11787006_1

C. Dwork, Differential Privacy in New Settings, Proc. of the Twenty- First Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010, pp.174-183, 2010.
DOI : 10.1137/1.9781611973075.16

C. Dwork, A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-96, 2011.
DOI : 10.1145/1866739.1866758

C. Dwork and J. Lei, Differential privacy and robust statistics, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.371-380, 2009.
DOI : 10.1145/1536414.1536466

A. Ghosh, T. Roughgarden, and M. Sundararajan, Universally utilitymaximizing privacy mechanisms, Proc. of the 41st annual ACM symposium on Theory of computing, STOC '09, pp.351-360, 2009.

J. Heusser and P. Malacaria, Applied Quantitative Information Flow and Statistical Databases, Proc. of the Int. Workshop on Formal Aspects in Security and Trust, pp.96-110, 2009.
DOI : 10.1007/978-3-642-12459-4_8

B. Köpf and D. A. Basin, An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007.
DOI : 10.1145/1315245.1315282

P. Malacaria, Assessing security threats of looping constructs, Proc. of POPL, pp.225-235, 2007.

P. Malacaria and H. Chen, Lagrange multipliers and maximum information leakage in different observational models, Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security , PLAS '08, pp.135-146, 2008.
DOI : 10.1145/1375696.1375713

. Massey, Guessing and entropy, Proceedings of 1994 IEEE International Symposium on Information Theory, p.204, 1994.
DOI : 10.1109/ISIT.1994.394764

I. S. Moskowitz, R. E. Newman, D. P. Crepeau, and A. R. Miller, Covert channels and anonymizing networks, Proceeding of the ACM workshop on Privacy in the electronic society , WPES '03, pp.79-88, 2003.
DOI : 10.1145/1005140.1005153

I. S. Moskowitz, R. E. Newman, and P. F. Syverson, Quasi-anonymous channels, Proc. of CNIS, pp.126-131, 2003.

. Pliam, On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks, Proc. of INDOCRYPT, number 1977 in LNCS, pp.67-79, 2000.
DOI : 10.1007/3-540-44495-5_7

A. Rényi, On Measures of Entropy and Information, Proc. of the 4th Berkeley Symposium on Mathematics, Statistics, and Probability, pp.547-561, 1961.

C. E. Shannon, A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 1948.
DOI : 10.1002/j.1538-7305.1948.tb01338.x

G. Smith, On the Foundations of Quantitative Information Flow, Proc. of FOSSACS, pp.288-302, 2009.
DOI : 10.1137/060651380

Y. Zhu and R. Bettati, Anonymity vs. information leakage in anonymity systems, Proc. of ICDCS, pp.514-524, 2005.