M. S. Alvim, M. E. Andrés, and C. Palamidessi, Information Flow in Interactive Systems, Journal of Computer Security, 2011.
DOI : 10.1007/978-3-642-15375-4_8

URL : https://hal.archives-ouvertes.fr/inria-00479672

M. S. Alvim, K. Chatzikokolakis, C. Palamidessi, and G. Smith, Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012.
DOI : 10.1109/CSF.2012.26

URL : https://hal.archives-ouvertes.fr/hal-00734044

M. Backes and B. Köpf, Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks, ESORICS LNCS, vol.11, issue.1, pp.517-532, 2008.
DOI : 10.1007/11894063_3

C. Braun, K. Chatzikokolakis, and C. Palamidessi, Quantitative Notions of Leakage for One-try Attacks, Proc. of MFPS 2009, pp.75-91, 2009.
DOI : 10.1016/j.entcs.2009.07.085

URL : https://hal.archives-ouvertes.fr/inria-00424852

M. Boreale, Quantifying information leakage in process calculi, Information and Computation, vol.207, issue.6, pp.699-725, 2009.
DOI : 10.1016/j.ic.2008.12.007

M. Boreale, F. Pampaloni, and M. Paolini, Asymptotic information leakage under one-try attacks, Proc. of FoSSaCS 2011, pp.396-410, 2011.
DOI : 10.1007/978-3-642-19805-2_27

M. Boreale, F. Pampaloni, and M. Paolini, Quantitative Information Flow, with a View, Proc. of ESORICS 2011, pp.588-606, 2011.
DOI : 10.1007/978-3-642-23822-2_32

M. Boreale and F. Pampaloni, Quantitative Multirun Security under Active Adversaries, 2012 Ninth International Conference on Quantitative Evaluation of Systems, pp.158-167, 2012.
DOI : 10.1109/QEST.2012.31

M. Boreale and M. Paolini, Worst-and Average-Case Privacy Breaches in Randomization Mechanisms, IFIP TCS, vol.2012, pp.72-86, 2012.

D. Clark, S. Hunt, and P. Malacaria, Quantitative Analysis of the Leakage of Confidential Data, Electronic Notes in Theoretical Computer Science, vol.59, issue.3, 2001.
DOI : 10.1016/S1571-0661(04)00290-7

Y. Dodis and A. Smith, Entropic Security and the Encryption of High Entropy Messages, TCC 2005, 2005.
DOI : 10.1007/978-3-540-30576-7_30

C. Dwork, Differential Privacy, LNCS, vol.4052, pp.1-12, 2006.
DOI : 10.1007/11787006_1

C. Dwork, F. Mcsherry, K. Nissim, and A. Smith, Calibrating Noise to Sensitivity in Private Data Analysis, Proc. of the 3rd IACR Theory of Cryptography Conference, 2006.
DOI : 10.1007/11681878_14

J. Kelsey, B. Schneier, D. Wagner, and C. Hall, Side Channel Cryptanalysis of Product Ciphers, Journal of Computer Security, vol.8, issue.23, 2000.

B. Köpf and D. Basin, An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007.
DOI : 10.1145/1315245.1315282

E. Lemay, M. D. Ford, K. Keefe, W. H. Sanders, and C. Muehrcke, Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE), 2011 Eighth International Conference on Quantitative Evaluation of SysTems, pp.191-200, 2011.
DOI : 10.1109/QEST.2011.34

M. D. Ford, P. Buchholz, and W. H. Sanders, State-Based Analysis in ADVISE, 2012 Ninth International Conference on Quantitative Evaluation of Systems, pp.148-157, 2012.
DOI : 10.1109/QEST.2012.36

B. Köpf and G. Smith, Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks, 2010 23rd IEEE Computer Security Foundations Symposium, pp.44-56, 2010.
DOI : 10.1109/CSF.2010.11

G. Smith, On the Foundations of Quantitative Information Flow, Proc. of FoSSaCS 2009, pp.288-302, 2009.
DOI : 10.1137/060651380