Information Flow in Interactive Systems, Journal of Computer Security, 2011. ,
DOI : 10.1007/978-3-642-15375-4_8
URL : https://hal.archives-ouvertes.fr/inria-00479672
Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012. ,
DOI : 10.1109/CSF.2012.26
URL : https://hal.archives-ouvertes.fr/hal-00734044
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks, ESORICS LNCS, vol.11, issue.1, pp.517-532, 2008. ,
DOI : 10.1007/11894063_3
Quantitative Notions of Leakage for One-try Attacks, Proc. of MFPS 2009, pp.75-91, 2009. ,
DOI : 10.1016/j.entcs.2009.07.085
URL : https://hal.archives-ouvertes.fr/inria-00424852
Quantifying information leakage in process calculi, Information and Computation, vol.207, issue.6, pp.699-725, 2009. ,
DOI : 10.1016/j.ic.2008.12.007
Asymptotic information leakage under one-try attacks, Proc. of FoSSaCS 2011, pp.396-410, 2011. ,
DOI : 10.1007/978-3-642-19805-2_27
Quantitative Information Flow, with a View, Proc. of ESORICS 2011, pp.588-606, 2011. ,
DOI : 10.1007/978-3-642-23822-2_32
Quantitative Multirun Security under Active Adversaries, 2012 Ninth International Conference on Quantitative Evaluation of Systems, pp.158-167, 2012. ,
DOI : 10.1109/QEST.2012.31
Worst-and Average-Case Privacy Breaches in Randomization Mechanisms, IFIP TCS, vol.2012, pp.72-86, 2012. ,
Quantitative Analysis of the Leakage of Confidential Data, Electronic Notes in Theoretical Computer Science, vol.59, issue.3, 2001. ,
DOI : 10.1016/S1571-0661(04)00290-7
Entropic Security and the Encryption of High Entropy Messages, TCC 2005, 2005. ,
DOI : 10.1007/978-3-540-30576-7_30
Differential Privacy, LNCS, vol.4052, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
Calibrating Noise to Sensitivity in Private Data Analysis, Proc. of the 3rd IACR Theory of Cryptography Conference, 2006. ,
DOI : 10.1007/11681878_14
Side Channel Cryptanalysis of Product Ciphers, Journal of Computer Security, vol.8, issue.23, 2000. ,
An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007. ,
DOI : 10.1145/1315245.1315282
Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE), 2011 Eighth International Conference on Quantitative Evaluation of SysTems, pp.191-200, 2011. ,
DOI : 10.1109/QEST.2011.34
State-Based Analysis in ADVISE, 2012 Ninth International Conference on Quantitative Evaluation of Systems, pp.148-157, 2012. ,
DOI : 10.1109/QEST.2012.36
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks, 2010 23rd IEEE Computer Security Foundations Symposium, pp.44-56, 2010. ,
DOI : 10.1109/CSF.2010.11
On the Foundations of Quantitative Information Flow, Proc. of FoSSaCS 2009, pp.288-302, 2009. ,
DOI : 10.1137/060651380