S. Mário, K. Alvim, and . Chatzikokolakis, Catuscia Measuring Information Leakage Using Generalized Gain Functions, Proc. of CSF, pp.265-279, 2012.

M. Andres, E. , C. Palamidessi, A. Sokolova, and &. Peter-van-rossum, Information hiding in probabilistic concurrent systems, Theoretical Computer Science, vol.412, issue.28, pp.3072-3089, 2011.
DOI : 10.1016/j.tcs.2011.02.045

URL : https://hal.archives-ouvertes.fr/hal-00548187

G. Barthe and &. Köpf, Information-Theoretic Bounds for Differentially Private Mechanisms, 2011 IEEE 24th Computer Security Foundations Symposium, pp.191-204, 2011.
DOI : 10.1109/CSF.2011.20

F. Biondi, A. Legay, P. , and A. Wasowski, Quantifying Information Leakage of Randomized Protocols, Proc. of VMCAI, pp.68-8710, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01242614

M. Boreale, Quantifying information leakage in process calculi, Information and Computation, vol.207, issue.6, pp.699-725, 2009.
DOI : 10.1016/j.ic.2008.12.007

M. Boreale, F. Pampaloni, and &. Paolini, Asymptotic Information Leakage under One-Try Attacks, Proc. of FOSSACS, pp.396-410, 2011.
DOI : 10.1007/978-3-642-19805-2_27

C. Braun, K. Chatzikokolakis, and &. Palamidessi, Quantitative Notions of Leakage for One-try Attacks, Proc. of MFPS, ENTCS 249, pp.75-91, 2009.
DOI : 10.1016/j.entcs.2009.07.085

URL : https://hal.archives-ouvertes.fr/inria-00424852

R. Canetti, L. Cheung, D. Kirli-kaynar, M. Liskov, N. A. Lynch et al., Analyzing Security Protocols Using Time-Bounded Task-PIOAs. Discrete Event Dynamic Systems 18, pp.111-15910, 2008.

K. Chatzikokolakis and &. Palamidessi, Making random choices invisible to the scheduler, Proc. of CONCUR'07, pp.42-58, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00424860

K. Chatzikokolakis, C. Palamidessi, and &. Prakash-panangaden, Anonymity Protocols as Noisy Channels, Inf. Comput, vol.20624, pp.378-401, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00349225

D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981.
DOI : 10.1145/358549.358563

T. Chothia, Y. Kawamoto, and C. Novakovic, A Tool for Estimating Information Leakage, Proc. of CAV'13, pp.10-1007, 2013.
DOI : 10.1007/978-3-642-39799-8_47

T. Chothia, Y. Kawamoto, and C. Novakovic, LeakWatch: Estimating Information Leakage from Java Programs, Proc. of ESORICS'14, pp.219-236, 2014.
DOI : 10.1007/978-3-319-11212-1_13

URL : https://hal.archives-ouvertes.fr/hal-01097603

T. Chothia, Y. Kawamoto, C. Novakovic, and &. Parker, Probabilistic Point-to-Point Information Leakage, 2013 IEEE 26th Computer Security Foundations Symposium, pp.193-205, 2013.
DOI : 10.1109/CSF.2013.20

D. Clark, S. Hunt, and &. Malacaria, Quantitative Analysis of the Leakage of Confidential Data, Proc. of QAPL'01, pp.238-25110, 2001.
DOI : 10.1016/S1571-0661(04)00290-7

B. Espinoza and &. Smith, Min-Entropy Leakage of Channels in Cascade, Proc. of FAST, pp.70-84, 2011.
DOI : 10.1007/978-3-642-29420-4_5

B. Espinoza and &. Smith, Min-entropy as a resource, Information and Computation, vol.226, 2013.
DOI : 10.1016/j.ic.2013.03.005

Y. Kawamoto, K. Chatzikokolakis, and &. Palamidessi, Compositionality Results for Quantitative Information Flow, Proc. of QEST'14, pp.368-383, 2014.
DOI : 10.1007/978-3-319-10696-0_28

URL : https://hal.archives-ouvertes.fr/hal-01006381

C. Paul and . Kocher, Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems, Proc. of CRYPTO'96, pp.104-11310, 1996.

B. Köpf, &. David, and A. Basin, An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007.
DOI : 10.1145/1315245.1315282

A. Mciver, C. Morgan, G. Smith, B. Espinoza, and L. Meinicke, Abstract Channels and Their Robust Information-Leakage Ordering, Proc. of POST'14, pp.83-102, 2014.
DOI : 10.1007/978-3-642-54792-8_5

G. Smith, On the Foundations of Quantitative Information Flow, Proc. of FOSSACS, pp.288-302, 2009.
DOI : 10.1137/060651380

G. Smith, Quantifying Information Flow Using Min-Entropy, 2011 Eighth International Conference on Quantitative Evaluation of SysTems, pp.159-167, 2011.
DOI : 10.1109/QEST.2011.31

L. Zhang, &. Martin, and R. Neuhäußer, Model Checking Interactive Markov Chains, Proc. of TACAS'10, pp.53-68, 2010.
DOI : 10.1007/978-3-642-12002-2_5