Joachim Breitner
Joachim Breitner
Verified email at - Homepage
Cited by
Cited by
Sliding right into disaster: Left-to-right sliding windows leak
DJ Bernstein, J Breitner, D Genkin, LG Bruinderink, N Heninger, T Lange, ...
International Conference on Cryptographic Hardware and Embedded Systems, 555-576, 2017
Total haskell is reasonable coq
A Spector-Zabusky, J Breitner, C Rizkallah, S Weirich
Proceedings of the 7th ACM SIGPLAN International Conference on Certified …, 2018
Biased nonce sense: Lattice attacks against weak ECDSA signatures in cryptocurrencies
J Breitner, N Heninger
International Conference on Financial Cryptography and Data Security, 3-20, 2019
Safe zero-cost coercions for Haskell
J Breitner, RA Eisenberg, S Peyton Jones, S Weirich
Proceedings of the 19th ACM SIGPLAN international conference on Functional …, 2014
Modular, higher order cardinality analysis in theory and practice
I Sergey, D Vytiniotis, SLP Jones, J Breitner
Journal of Functional Programming 27, 2017
Safe zero-cost coercions for Haskell
J Breitner, RA Eisenberg, SP Jones, S Weirich
Journal of Functional Programming 26, 2016
Visual theorem proving with the Incredible Proof Machine
J Breitner
International Conference on Interactive Theorem Proving, 123-139, 2016
Ready, set, verify! Applying hs-to-coq to real-world Haskell code (Experience report)
J Breitner, A Spector-Zabusky, Y Li, C Rizkallah, J Wiegley, S Weirich
Proceedings of the ACM on Programming Languages 2 (ICFP), 1-16, 2018
Theorem proving for all: equational reasoning in liquid Haskell (functional pearl)
N Vazou, J Breitner, R Kunkel, D Van Horn, G Hutton
Proceedings of the 11th ACM SIGPLAN International Symposium on Haskell, 132-144, 2018
Formally proving a compiler transformation safe
J Breitner
ACM SIGPLAN Notices 50 (12), 35-46, 2015
Securing concurrent lazy programs against information leakage
M Vassena, J Breitner, A Russo
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 37-52, 2017
Der grader praktomat
J Breitner, M Hecker, G Snelting
Automatisierte Bewertung in der Programmierausbildung, 159-172, 2017
On improvements of low-deterministic security
J Breitner, J Graf, M Hecker, M Mohr, G Snelting
International Conference on Principles of Security and Trust, 68-88, 2016
The correctness of Launchbury's natural semantics for lazy evaluation
J Breitner
arXiv preprint arXiv:1405.3099, 2014
Lazy Evaluation: From natural semantics to a machine-checked compiler transformation
J Breitner
Karlsruhe Institute of Technology, 2016
Call arity
J Breitner
International Symposium on Trends in Functional Programming, 34-50, 2014
dup--Explicit un-sharing in Haskell
J Breitner
arXiv preprint arXiv:1207.2017, 2012
Low-deterministic security for low-nondeterministic programs
S Bischof, J Breitner, J Graf, M Hecker, M Mohr, G Snelting
Journal of Computer Security 26 (3), 335-366, 2018
Certified HLints with Isabelle/HOLCF-Prelude
J Breitner, B Huffman, N Mitchell, C Sternagel
arXiv preprint arXiv:1306.1340, 2013
A promise checked is a promise kept: inspection testing
J Breitner
Proceedings of the 11th ACM SIGPLAN International Symposium on Haskell, 14-25, 2018
The system can't perform the operation now. Try again later.
Articles 1–20