Follow
Joachim Breitner
Joachim Breitner
unaffiliated
Verified email at joachim-breitner.de - Homepage
Title
Cited by
Cited by
Year
Sliding right into disaster: Left-to-right sliding windows leak
DJ Bernstein, J Breitner, D Genkin, L Groot Bruinderink, N Heninger, ...
International Conference on Cryptographic Hardware and Embedded Systems, 555-576, 2017
642017
Biased nonce sense: Lattice attacks against weak ECDSA signatures in cryptocurrencies
J Breitner, N Heninger
International Conference on Financial Cryptography and Data Security, 3-20, 2019
602019
Total haskell is reasonable coq
A Spector-Zabusky, J Breitner, C Rizkallah, S Weirich
Proceedings of the 7th ACM SIGPLAN International Conference on Certified …, 2018
552018
Safe zero-cost coercions for Haskell
J Breitner, RA Eisenberg, S Peyton Jones, S Weirich
Proceedings of the 19th ACM SIGPLAN international conference on Functional …, 2014
392014
Modular, higher-order cardinality analysis in theory and practice
I Sergey, D Vytiniotis, S Peyton Jones
Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of …, 2014
332014
Ready, set, verify! applying hs-to-coq to real-world Haskell code (experience report)
J Breitner, A Spector-Zabusky, Y Li, C Rizkallah, J Wiegley, S Weirich
Proceedings of the ACM on Programming Languages 2 (ICFP), 1-16, 2018
32*2018
Theorem proving for all: equational reasoning in liquid Haskell (functional pearl)
N Vazou, J Breitner, R Kunkel, D Van Horn, G Hutton
Proceedings of the 11th ACM SIGPLAN International Symposium on Haskell, 132-144, 2018
26*2018
Visual theorem proving with the Incredible Proof Machine
J Breitner
International Conference on Interactive Theorem Proving, 123-139, 2016
232016
Safe zero-cost coercions for Haskell
J Breitner, RA Eisenberg, SP Jones, S Weirich
Journal of Functional Programming 26, 2016
232016
Der grader praktomat
J Breitner, M Hecker, G Snelting
Automatisierte Bewertung in der Programmierausbildung, 159-172, 2017
182017
Formally proving a compiler transformation safe
J Breitner
ACM SIGPLAN Notices 50 (12), 35-46, 2015
142015
Securing concurrent lazy programs against information leakage
M Vassena, J Breitner, A Russo
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 37-52, 2017
132017
On improvements of low-deterministic security
J Breitner, J Graf, M Hecker, M Mohr, G Snelting
International Conference on Principles of Security and Trust, 68-88, 2016
132016
The correctness of Launchbury's natural semantics for lazy evaluation
J Breitner
arXiv preprint arXiv:1405.3099, 2014
112014
Low-deterministic security for low-nondeterministic programs
S Bischof, J Breitner, J Graf, M Hecker, M Mohr, G Snelting
Journal of Computer Security 26 (3), 335-366, 2018
92018
Lazy Evaluation: From natural semantics to a machine-checked compiler transformation
J Breitner
Karlsruhe Institute of Technology, 2016
92016
Call arity
J Breitner
International Symposium on Trends in Functional Programming, 34-50, 2014
92014
A promise checked is a promise kept: inspection testing
J Breitner
Proceedings of the 11th ACM SIGPLAN International Symposium on Haskell, 14-25, 2018
82018
Type variables in patterns
RA Eisenberg, J Breitner, S Peyton Jones
ACM SIGPLAN Notices 53 (7), 94-105, 2018
82018
dup--Explicit un-sharing in Haskell
J Breitner
arXiv preprint arXiv:1207.2017, 2012
82012
The system can't perform the operation now. Try again later.
Articles 1–20