Joachim Breitner
Joachim Breitner
Lean FRO
Verified email at - Homepage
Cited by
Cited by
Biased nonce sense: Lattice attacks against weak ECDSA signatures in cryptocurrencies
J Breitner, N Heninger
Financial Cryptography and Data Security: 23rd International Conference, FC …, 2019
Sliding right into disaster: Left-to-right sliding windows leak
DJ Bernstein, J Breitner, D Genkin, L Groot Bruinderink, N Heninger, ...
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
Total haskell is reasonable coq
A Spector-Zabusky, J Breitner, C Rizkallah, S Weirich
Proceedings of the 7th ACM SIGPLAN International Conference on Certified …, 2018
Ready, set, verify! applying hs-to-coq to real-world Haskell code (experience report)
J Breitner, A Spector-Zabusky, Y Li, C Rizkallah, J Wiegley, S Weirich
Proceedings of the ACM on Programming Languages 2 (ICFP), 1-16, 2018
Safe zero-cost coercions for Haskell
J Breitner, RA Eisenberg, S Peyton Jones, S Weirich
Proceedings of the 19th ACM SIGPLAN international conference on Functional …, 2014
Visual theorem proving with the Incredible Proof Machine
J Breitner
Interactive Theorem Proving: 7th International Conference, ITP 2016, Nancy …, 2016
Theorem proving for all: equational reasoning in liquid Haskell (functional pearl)
N Vazou, J Breitner, R Kunkel, D Van Horn, G Hutton
Proceedings of the 11th ACM SIGPLAN International Symposium on Haskell, 132-144, 2018
Safe zero-cost coercions for Haskell
J Breitner, RA Eisenberg, SP Jones, S Weirich
Journal of Functional Programming 26, e15, 2016
Der grader praktomat
J Breitner, M Hecker, G Snelting
Automatisierte Bewertung in der Programmierausbildung 6, 2017
Formally proving a compiler transformation safe
J Breitner
ACM SIGPLAN Notices 50 (12), 35-46, 2015
Securing concurrent lazy programs against information leakage
M Vassena, J Breitner, A Russo
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 37-52, 2017
On improvements of low-deterministic security
J Breitner, J Graf, M Hecker, M Mohr, G Snelting
Principles of Security and Trust: 5th International Conference, POST 2016 …, 2016
Lazy Evaluation: From natural semantics to a machine-checked compiler transformation
J Breitner
Karlsruhe Institute of Technology, 2016
Modular, higher order cardinality analysis in theory and practice
I Sergey, D Vytiniotis, SLP Jones, J Breitner
Journal of Functional Programming 27, e11, 2017
The correctness of Launchbury's natural semantics for lazy evaluation
J Breitner
arXiv preprint arXiv:1405.3099, 2014
Low-deterministic security for low-nondeterministic programs
S Bischof, J Breitner, J Graf, M Hecker, M Mohr, G Snelting
Journal of Computer Security 26 (3), 335-366, 2018
Call arity
J Breitner
International Symposium on Trends in Functional Programming, 34-50, 2014
A promise checked is a promise kept: inspection testing
J Breitner
Proceedings of the 11th ACM SIGPLAN International Symposium on Haskell, 14-25, 2018
Type variables in patterns
RA Eisenberg, J Breitner, S Peyton Jones
ACM SIGPLAN Notices 53 (7), 94-105, 2018
dup--Explicit un-sharing in Haskell
J Breitner
arXiv preprint arXiv:1207.2017, 2012
The system can't perform the operation now. Try again later.
Articles 1–20