Joachim Breitner
Joachim Breitner
DFINITIY
Verified email at joachim-breitner.de - Homepage
Title
Cited by
Cited by
Year
Sliding right into disaster: Left-to-right sliding windows leak
DJ Bernstein, J Breitner, D Genkin, LG Bruinderink, N Heninger, T Lange, ...
International Conference on Cryptographic Hardware and Embedded Systems, 555-576, 2017
482017
Total haskell is reasonable coq
A Spector-Zabusky, J Breitner, C Rizkallah, S Weirich
Proceedings of the 7th ACM SIGPLAN International Conference on Certified …, 2018
382018
Biased nonce sense: Lattice attacks against weak ECDSA signatures in cryptocurrencies
J Breitner, N Heninger
International Conference on Financial Cryptography and Data Security, 3-20, 2019
362019
Safe zero-cost coercions for Haskell
J Breitner, RA Eisenberg, S Peyton Jones, S Weirich
Proceedings of the 19th ACM SIGPLAN international conference on Functional …, 2014
342014
Modular, higher order cardinality analysis in theory and practice
I Sergey, D Vytiniotis, SLP Jones, J Breitner
Journal of Functional Programming 27, 2017
312017
Safe zero-cost coercions for Haskell
J Breitner, RA Eisenberg, SP Jones, S Weirich
Journal of Functional Programming 26, 2016
202016
Visual theorem proving with the Incredible Proof Machine
J Breitner
International Conference on Interactive Theorem Proving, 123-139, 2016
172016
Ready, set, verify! Applying hs-to-coq to real-world Haskell code (Experience report)
J Breitner, A Spector-Zabusky, Y Li, C Rizkallah, J Wiegley, S Weirich
Proceedings of the ACM on Programming Languages 2 (ICFP), 1-16, 2018
16*2018
Theorem proving for all: equational reasoning in liquid Haskell (functional pearl)
N Vazou, J Breitner, R Kunkel, D Van Horn, G Hutton
Proceedings of the 11th ACM SIGPLAN International Symposium on Haskell, 132-144, 2018
15*2018
Formally proving a compiler transformation safe
J Breitner
ACM SIGPLAN Notices 50 (12), 35-46, 2015
142015
Securing concurrent lazy programs against information leakage
M Vassena, J Breitner, A Russo
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 37-52, 2017
132017
Der grader praktomat
J Breitner, M Hecker, G Snelting
Automatisierte Bewertung in der Programmierausbildung, 159-172, 2017
132017
On improvements of low-deterministic security
J Breitner, J Graf, M Hecker, M Mohr, G Snelting
International Conference on Principles of Security and Trust, 68-88, 2016
112016
The correctness of Launchbury's natural semantics for lazy evaluation
J Breitner
arXiv preprint arXiv:1405.3099, 2014
112014
Lazy Evaluation: From natural semantics to a machine-checked compiler transformation
J Breitner
Karlsruhe Institute of Technology, 2016
92016
Call arity
J Breitner
International Symposium on Trends in Functional Programming, 34-50, 2014
92014
dup--Explicit un-sharing in Haskell
J Breitner
arXiv preprint arXiv:1207.2017, 2012
82012
Low-deterministic security for low-nondeterministic programs
S Bischof, J Breitner, J Graf, M Hecker, M Mohr, G Snelting
Journal of Computer Security 26 (3), 335-366, 2018
72018
Certified HLints with Isabelle/HOLCF-Prelude
J Breitner, B Huffman, N Mitchell, C Sternagel
arXiv preprint arXiv:1306.1340, 2013
62013
A promise checked is a promise kept: inspection testing
J Breitner
Proceedings of the 11th ACM SIGPLAN International Symposium on Haskell, 14-25, 2018
52018
The system can't perform the operation now. Try again later.
Articles 1–20