M. S. Alvim, K. Chatzikokolakis, C. Palamidessi, and G. Smith, Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012.
DOI : 10.1109/CSF.2012.26

URL : https://hal.archives-ouvertes.fr/hal-00734044

F. Biondi, T. Given-wilson, and A. Legay, Attainable unconditional security for shared-key cryptosystems, 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp.1-8, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01378640

A. Bruen and M. Forcinito, Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century, 2011.
DOI : 10.1002/9781118033296

I. Csiszár and J. Körner, Broadcast channels with confidential messages, IEEE Transactions on Information Theory, vol.24, issue.3, pp.339-348, 1978.
DOI : 10.1109/TIT.1978.1055892

S. Ho, T. Chan, and C. Uduwerelle, Error-free perfect-secrecy systems, 2011 IEEE International Symposium on Information Theory Proceedings, pp.1613-1617, 2011.
DOI : 10.1109/ISIT.2011.6033797

B. Köpf and D. A. Basin, Automatically deriving information-theoretic bounds for adaptive side-channel attacks, Journal of Computer Security, vol.19, issue.1, pp.1-31, 2011.
DOI : 10.3233/JCS-2009-0397

A. Mileva and S. Markovski, Quasigroup Representation of Some Feistel and Generalized Feistel Ciphers, In: ICT Innovations, vol.207, pp.161-171, 2012.
DOI : 10.1007/978-3-642-37169-1_16

A. Russell and H. Wang, How to fool an unbounded adversary with a short key, IEEE Transactions on Information Theory, vol.52, issue.3, pp.1130-1140, 2006.
DOI : 10.1109/TIT.2005.864438

C. E. Shannon, A mathematical theory of communication. The Bell system technical journal 27, pp.379-423, 1948.

C. E. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

G. Smith, On the Foundations of Quantitative Information Flow, Foundations of Software Science and Computational Structures, 12th International Conference, FOSSACS 2009, Held as Part of the Joint European Conferences on Theory and Practice of Software of Lecture Notes in Computer Science, pp.288-302, 2009.
DOI : 10.1137/060651380

D. Welsh, Codes and Cryptography, 1988.

Y. Wu, J. P. Noonan, and S. S. Agaian, Dynamic and implicit latin square doubly stochastic S-boxes with reversibility, 2011 IEEE International Conference on Systems, Man, and Cybernetics, pp.3358-3364, 2011.
DOI : 10.1109/ICSMC.2011.6084188

Y. Wu, Y. Zhou, J. P. Noonan, and S. S. Agaian, Design of image cipher using latin squares, Information Sciences, vol.264, pp.317-339, 2014.
DOI : 10.1016/j.ins.2013.11.027