M. S. Alvim, K. Chatzikokolakis, A. Mciver, C. Morgan, C. Palamidessi et al., Additive and Multiplicative Notions of Leakage, and Their Capacities, 2014 IEEE 27th Computer Security Foundations Symposium, pp.308-322, 2014.
DOI : 10.1109/CSF.2014.29

URL : https://hal.archives-ouvertes.fr/hal-00989462

M. S. Alvim, K. Chatzikokolakis, A. Mciver, C. Morgan, C. Palamidessi et al., Axioms for Information Leakage, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp.77-92, 2016.
DOI : 10.1109/CSF.2016.13

URL : https://hal.archives-ouvertes.fr/hal-01330414

M. S. Alvim, K. Chatzikokolakis, C. Palamidessi, and G. Smith, Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012.
DOI : 10.1109/CSF.2012.26

URL : https://hal.archives-ouvertes.fr/hal-00734044

T. Antonopoulos, P. Gazzillo, M. Hicks, E. Koskinen, T. Terauchi et al., Decomposition instead of self-composition for proving the absence of timing channels, pp.362-375, 2017.

M. Backes, B. Köpf, and A. Rybalchenko, Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.141-153, 2009.
DOI : 10.1109/SP.2009.18

G. Barthe and B. Köpf, Information-Theoretic Bounds for Differentially Private Mechanisms, 2011 IEEE 24th Computer Security Foundations Symposium, pp.191-204, 2011.
DOI : 10.1109/CSF.2011.20

F. Biondi, Y. Kawamoto, A. Legay, and L. Traonouez, HyLeak: Hybrid Analysis Tool for Information Leakage, ATVA. LNCS, pp.156-163, 2017.
DOI : 10.1007/978-3-319-47072-6_4

URL : https://hal.archives-ouvertes.fr/hal-01546817

F. Biondi, A. Legay, L. M. Traonouez, and A. , QUAIL: A Quantitative Security Analyzer for Imperative Code, Proc. of CAV, pp.702-707, 2013.
DOI : 10.1007/978-3-642-39799-8_49

URL : https://hal.archives-ouvertes.fr/hal-01242615

C. Braun, K. Chatzikokolakis, and C. Palamidessi, Quantitative Notions of Leakage for One-try Attacks, Proc. of MFPS. ENTCS, pp.75-91, 2009.
DOI : 10.1016/j.entcs.2009.07.085

URL : https://hal.archives-ouvertes.fr/inria-00424852

K. Chatzikokolakis, T. Chothia, and A. Guha, Statistical Measurement of Information Leakage, Proc. of TACAS, pp.390-404, 2010.
DOI : 10.1007/978-3-642-12002-2_33

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, On the Bayes risk in information-hiding protocols, Journal of Computer Security, vol.16, issue.5, pp.531-571, 2008.
DOI : 10.3233/JCS-2008-0333

URL : https://hal.archives-ouvertes.fr/inria-00349224

M. R. Clarkson and F. B. Schneider, Quantification of integrity, Proc. of CSF, pp.28-43, 2010.

T. M. Cover and J. A. Thomas, Elements of Information Theory, 2006.

G. Doychev and B. Köpf, Rigorous analysis of software countermeasures against cache attacks, pp.406-421, 2017.

J. Heusser and P. Malacaria, Quantifying information leaks in software, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.261-269, 2010.
DOI : 10.1145/1920261.1920300

M. H. Khouzani and P. Malacaria, Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp.61-76, 2016.
DOI : 10.1109/CSF.2016.12

B. Köpf and D. Basin, An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007.
DOI : 10.1145/1315245.1315282

B. Köpf, L. Mauborgne, and M. Ochoa, Automatic Quantification of Cache Side-Channels, Proc. of CAV '12, pp.564-580, 2012.
DOI : 10.1007/978-3-642-31424-7_40

B. Köpf and A. Rybalchenko, Approximation and randomization for quantitative informationflow analysis, Proc. of CSF, pp.3-14, 2010.

B. Köpf and G. Smith, Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks, 2010 23rd IEEE Computer Security Foundations Symposium, pp.44-56, 2010.
DOI : 10.1109/CSF.2010.11

P. Malacaria, Assessing security threats of looping constructs, Proc. of POPL, pp.225-235, 2007.

A. Mciver, L. Meinicke, and C. Morgan, Compositional Closure for Bayes Risk in Probabilistic Noninterference, Proc. ICALP'10, pp.223-235, 2010.
DOI : 10.1007/978-3-642-14162-1_19

Z. Meng and G. Smith, Calculating bounds on information leakage using two-bit patterns, Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security, PLAS '11, pp.1-112, 2011.
DOI : 10.1145/2166956.2166957

G. Smith, On the Foundations of Quantitative Information Flow, Proc. of FOSSACS, pp.288-302, 2009.
DOI : 10.1137/060651380

I. Sweet, J. M. Trilla, C. Scherrer, M. Hicks, and S. Magill, What???s the Over/Under? Probabilistic Bounds on Information Leakage, POST. LNCS, pp.3-27, 2018.
DOI : 10.1016/j.entcs.2008.11.018

C. Villani, Topics in optimal transportation, 2003.
DOI : 10.1090/gsm/058

H. Yasuoka and T. Terauchi, Quantitative Information Flow - Verification Hardness and Possibilities, 2010 23rd IEEE Computer Security Foundations Symposium, pp.15-27, 2010.
DOI : 10.1109/CSF.2010.9