M. Andrés, N. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, Geoindistinguishability: Differential privacy for location-based systems, Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2013.

G. Barthe, B. Köpf, F. Olmedo, and S. Z. Béguelin, Probabilistic relational reasoning for differential privacy, Proceedings of the 39th Annual ACM Symposium on Principles of Programming Languages (POPL), 2012.

T. Champion, L. De-pascale, and P. Juutinen, The $\infty$-Wasserstein Distance: Local Solutions and Existence of Optimal Transport Maps, SIAM Journal on Mathematical Analysis, vol.40, issue.1, pp.1-20, 2008.
DOI : 10.1137/07069938X

URL : https://hal.archives-ouvertes.fr/hal-01288953

S. Chaudhuri, S. Gulwani, R. Lublinerman, and S. Navidpour, Proving programs robust, Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering, SIGSOFT/FSE '11, pp.102-112, 2011.
DOI : 10.1145/2025113.2025131

R. M. Corless, G. H. Gonnet, D. E. Hare, D. J. Jeffrey, and D. E. Knuth, On the lambert w function, Advances in Computational Mathematics, pp.329-359, 1996.

C. Dwork, Differential Privacy, 33rd International Colloquium on Automata, Languages and Programming, pp.1-12, 2006.
DOI : 10.1007/11787006_1

C. Dwork, F. Mcsherry, K. Nissim, and A. Smith, Calibrating Noise to Sensitivity in Private Data Analysis, Proceedings of the Third Theory of Cryptography Conference (TCC), pp.265-284, 2006.
DOI : 10.1007/11681878_14

M. Gaboardi, A. Haeberlen, J. Hsu, A. Narayan, and B. C. Pierce, Linear dependent types for differential privacy, The 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'13), pp.357-370, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00909340

I. Gazeau, D. Miller, and C. Palamidessi, A non-local method for robustness analysis of floating point programs, Proceedings of the 10th Workshop on Quantitative Aspects of Programming Languages and Systems, pp.63-76, 2012.
DOI : 10.4204/EPTCS.85.5

URL : https://hal.archives-ouvertes.fr/hal-00665995

G. J. Hekstra and E. F. Deprettere, Floating point Cordic, Proceedings of IEEE 11th Symposium on Computer Arithmetic, 1993.
DOI : 10.1109/ARITH.1993.378100

S. Ho and S. Ruan, Differential privacy for location pattern mining, Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '11, pp.17-24, 2011.
DOI : 10.1145/2071880.2071884

I. Task and P. , IEEE 754-2008, Standard for Floating-Point Arithmetic, IEEE, 2008.

K. Kota and J. R. Cavallaro, Numerical accuracy and hardware tradeoffs for CORDIC arithmetic for special-purpose processors, IEEE Transactions on Computers, vol.42, issue.7, pp.769-779, 1993.
DOI : 10.1109/12.237718

A. Machanavajjhala, D. Kifer, J. M. Abowd, J. Gehrke, and L. Vilhuber, Privacy: Theory meets Practice on the Map, 2008 IEEE 24th International Conference on Data Engineering, pp.277-286, 2008.
DOI : 10.1109/ICDE.2008.4497436

I. Mironov, On significance of the least significant bits for differential privacy, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.650-661, 2012.
DOI : 10.1145/2382196.2382264

A. Narayanan and V. Shmatikov, De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009.
DOI : 10.1109/SP.2009.22

W. Rudin, Real and Complex Analysis, 1986.