C. E. Shannon, A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 1948.
DOI : 10.1002/j.1538-7305.1948.tb01338.x

G. Smith, On the Foundations of Quantitative Information Flow, Proc. FOS- SACS, pp.288-302, 2009.
DOI : 10.1137/060651380

G. Smith, Quantifying Information Flow Using Min-Entropy, 2011 Eighth International Conference on Quantitative Evaluation of SysTems, pp.159-167, 2011.
DOI : 10.1109/QEST.2011.31

T. Chothia, Y. Kawamoto, C. Novakovic, and D. Parker, Probabilistic Point-to-Point Information Leakage, 2013 IEEE 26th Computer Security Foundations Symposium, pp.193-205, 2013.
DOI : 10.1109/CSF.2013.20

R. Moddemeijer, On estimation of entropy and mutual information of continuous distributions, Signal Processing, vol.16, issue.3, pp.233-248, 1989.
DOI : 10.1016/0165-1684(89)90132-1

D. R. Brillinger, Some data analysis using mutual information, Brazilian Journal of Probability and Statistics, vol.18, issue.6, pp.163-183, 2004.

M. Boreale and M. Paolini, On Formally Bounding Information Leakage by Statistical Estimation, Unpublished Manuscript, 2014.
DOI : 10.1007/978-3-319-13257-0_13

F. Biondi, A. Legay, L. Traonouez, and A. Wasowski, QUAIL: A Quantitative Security Analyzer for Imperative Code, Proc. of the 25th International Conference on Computer Aided Verification, 2013.
DOI : 10.1007/978-3-642-39799-8_49

URL : https://hal.archives-ouvertes.fr/hal-01242615

C. Mu and D. Clark, A Tool: Quantitative Analyser for Programs, 2011 Eighth International Conference on Quantitative Evaluation of SysTems, pp.145-146, 2011.
DOI : 10.1109/QEST.2011.25

S. Mccamant and M. D. Ernst, Quantitative Information Flow as Network Flow Capacity, Proc. of the Conference on Programming Language Design and Implementation, pp.193-205, 2008.

J. Heusser and P. Malacaria, Quantifying information leaks in software, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.261-269, 2010.
DOI : 10.1145/1920261.1920300

Q. S. Phan, P. Malacaria, O. Tkachuk, and C. S. , Symbolic quantitative information flow, ACM SIGSOFT Software Engineering Notes, vol.37, issue.6, pp.1-5, 2012.
DOI : 10.1145/2382756.2382791

T. Chothia, Y. Kawamoto, and C. Novakovic, LeakWatch http

K. Chatzikokolakis, T. Chothia, and A. Guha, Statistical Measurement of Information Leakage, Proc. of the 16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp.390-404, 2010.
DOI : 10.1007/978-3-642-12002-2_33

D. E. Denning, Cryptography and Data Security, 1982.

A. C. Myers and B. Liskov, Complete, safe information flow with decentralized labels, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), pp.186-197, 1998.
DOI : 10.1109/SECPRI.1998.674834

K. Pearson, X. on the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling, Philosophical Magazine Series, vol.5, issue.302, pp.50-157, 1900.
URL : https://hal.archives-ouvertes.fr/hal-01438018

T. Chothia, Y. Kawamoto, and C. Novakovic, A Tool for Estimating Information Leakage, Proc. of the 25th Conference on Computer Aided Verification, pp.690-695, 2013.
DOI : 10.1007/978-3-642-39799-8_47

Y. Kawamoto, K. Chatzikokolakis, and C. Palamidessi, Compositionality Results for Quantitative Information Flow, Proc. of the 11th International Conference on Quantitative Evaluation of Systems, 2014.
DOI : 10.1007/978-3-319-10696-0_28

URL : https://hal.archives-ouvertes.fr/hal-01006381

D. Chaum, The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988.
DOI : 10.1007/BF00206326

F. D. Garcia, P. Van-rossum, R. Verdult, and R. W. Schreur, Wirelessly Pickpocketing a Mifare Classic Card, 2009 30th IEEE Symposium on Security and Privacy, pp.3-15, 2009.
DOI : 10.1109/SP.2009.6

R. Verdult, F. D. Garcia, and J. Balasch, Gone in 360 seconds: Hijacking with Hitag2, 21st USENIX Security Symposium (USENIX Security 2012), USENIX Association, pp.237-252, 2012.

J. Callas, L. Donnerhacke, H. Finney, D. Shaw, and R. Thayer, OpenPGP Message Format http
DOI : 10.17487/rfc2440