Relational algebras, Reports of the Midwest Category Seminar, IV Lecture Notes in Mathematics, vol.47, pp.39-55, 1970. ,
DOI : 10.1073/pnas.47.7.1043
Beyond Differential Privacy: Composition Theorems and Relational Logic for f-divergences between Probabilistic Programs, International Colloquium on Automata, Languages and Programming (ICALP), pp.49-60, 2013. ,
DOI : 10.1007/978-3-642-39212-2_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.378.3526
Formal certification of code-based cryptographic proofs, ACM SIGPLAN?SIGACT Symposium on Principles of Programming Languages (POPL), pp.90-101, 2009. ,
Probabilistic relational reasoning for differential privacy, ACM Transactions on Programming Languages and Systems, vol.35, issue.3, p.9, 2013. ,
DOI : 10.1145/2103656.2103670
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.5756
Proving Differential Privacy in Hoare Logic, 2014 IEEE 27th Computer Security Foundations Symposium ,
DOI : 10.1109/CSF.2014.36
Relational reasoning via probabilistic coupling, International Conference on Logic for Programming, Artificial Intelligence and Reasoning (LPAR), pp.387-401, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01246719
Higher-order approximate relational refinement types for mechanism design and differential privacy, ACM SIGPLAN? SIGACT Symposium on Principles of Programming Languages (POPL) ,
DOI : 10.1145/2775051.2677000
Simple relational correctness proofs for static analyses and program transformations, ACM SIGPLAN?SIGACT Symposium on Principles of Programming Languages (POPL), pp.14-25, 2004. ,
DOI : 10.1145/964001.964003
On the privacy properties of variants on the sparse vector technique ,
Logical, metric, and algorithmic characterisations of probabilistic bisimulation, 2011. ,
The algorithmic foundations of differential privacy URL http Our data, ourselves: Privacy via distributed noise generation, IACR International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), pp.3-4211, 2006. ,
Calibrating Noise to Sensitivity in Private Data Analysis, IACR Theory of Cryptography Conference (TCC), pp.265-284, 2006. ,
DOI : 10.1007/11681878_14
Preserving Statistical Validity in Adaptive Data Analysis, Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC '15, pp.117-126, 2015. ,
DOI : 10.1145/2746539.2746580
Pure Differential Privacy for Rectangle Queries via Private Partitions, International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), pp.735-751 ,
DOI : 10.1007/978-3-662-48800-3_30
Differential privacy: Now it's getting personal, ACM SIGPLAN?SIGACT Symposium on Principles of Programming Languages (POPL), pp.69-81, 2015. ,
DOI : 10.1145/2775051.2677005
Linear dependent types for differential privacy, ACM SIGPLAN? SIGACT Symposium on Principles of Programming Languages (POPL), pp.357-370, 2013. ,
DOI : 10.1145/2429069.2429113
URL : https://hal.archives-ouvertes.fr/hal-00909340
Differentially Private Combinatorial Optimization, ACM?SIAM Symposium on Discrete Algorithms (SODA), pp.1106-1125, 2010. ,
DOI : 10.1137/1.9781611973075.90
URL : http://arxiv.org/abs/0903.4510
On Generalized Feistel Networks, IACR International Cryptology Conference (CRYPTO), pp.613-630, 2010. ,
DOI : 10.1007/978-3-642-14623-7_33
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.185.3033
Probabilistic extensions of process algebras, Handbook of Process Algebra, pp.685-710, 2001. ,
Semantics of probabilistic programs, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979), pp.101-114, 1979. ,
DOI : 10.1109/SFCS.1979.38
URL : http://dx.doi.org/10.1016/0022-0000(81)90036-2
Bisimulation through probabilistic testing, ACM Symposium on Principles of Programming Languages (POPL), pp.344-352, 1989. ,
DOI : 10.1016/0890-5401(91)90030-6
Understanding the sparse vector technique for differential privacy, Proceedings of the VLDB Endowment, vol.10, issue.6, 2016. ,
DOI : 10.14778/3055330.3055331
Privacy integrated queries, ACM SIGMOD International Conference on Management of Data (SIGMOD), 2009. ,
Mechanism Design via Differential Privacy, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), pp.94-103, 2007. ,
DOI : 10.1109/FOCS.2007.66
(Not So) Random Shuffles of RC4, IACR International Cryptology Conference (CRYPTO), pp.304-319, 2002. ,
DOI : 10.1007/3-540-45708-9_20
Distance makes the types grow stronger: A calculus for differential privacy, ACM SIGPLAN International Conference on Functional Programming (ICFP) ,
Coupling, Stationarity, and Regeneration, 2000. ,
DOI : 10.1007/978-1-4612-1236-2
Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract), Electronic Notes in Theoretical Computer Science, vol.276, issue.0, pp.61-79, 2011. ,
DOI : 10.1016/j.entcs.2011.09.015
Metrics for Differential Privacy in Concurrent Systems, IFIP International Conference on Formal Techniques for Distributed Objects, Components and Systems (FORTE), pp.199-215, 2014. ,
DOI : 10.1007/978-3-662-43613-4_13
URL : https://hal.archives-ouvertes.fr/hal-00879140