Biased nonce sense: Lattice attacks against weak ECDSA signatures in cryptocurrencies J Breitner, N Heninger Financial Cryptography and Data Security: 23rd International Conference, FC …, 2019 | 105 | 2019 |
Sliding right into disaster: Left-to-right sliding windows leak DJ Bernstein, J Breitner, D Genkin, L Groot Bruinderink, N Heninger, ... Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017 | 81 | 2017 |
Total haskell is reasonable coq A Spector-Zabusky, J Breitner, C Rizkallah, S Weirich Proceedings of the 7th ACM SIGPLAN International Conference on Certified …, 2018 | 66 | 2018 |
Ready, set, verify! applying hs-to-coq to real-world Haskell code (experience report) J Breitner, A Spector-Zabusky, Y Li, C Rizkallah, J Wiegley, S Weirich Proceedings of the ACM on Programming Languages 2 (ICFP), 1-16, 2018 | 53* | 2018 |
Safe zero-cost coercions for Haskell J Breitner, RA Eisenberg, S Peyton Jones, S Weirich Proceedings of the 19th ACM SIGPLAN international conference on Functional …, 2014 | 42 | 2014 |
Visual theorem proving with the Incredible Proof Machine J Breitner Interactive Theorem Proving: 7th International Conference, ITP 2016, Nancy …, 2016 | 33 | 2016 |
Theorem proving for all: equational reasoning in liquid Haskell (functional pearl) N Vazou, J Breitner, R Kunkel, D Van Horn, G Hutton Proceedings of the 11th ACM SIGPLAN International Symposium on Haskell, 132-144, 2018 | 31* | 2018 |
Safe zero-cost coercions for Haskell J Breitner, RA Eisenberg, SP Jones, S Weirich Journal of Functional Programming 26, e15, 2016 | 24 | 2016 |
Der grader praktomat J Breitner, M Hecker, G Snelting Automatisierte Bewertung in der Programmierausbildung 6, 2017 | 23 | 2017 |
Formally proving a compiler transformation safe J Breitner ACM SIGPLAN Notices 50 (12), 35-46, 2015 | 18 | 2015 |
Securing concurrent lazy programs against information leakage M Vassena, J Breitner, A Russo 2017 IEEE 30th Computer Security Foundations Symposium (CSF), 37-52, 2017 | 13 | 2017 |
Modular, higher order cardinality analysis in theory and practice I Sergey, D Vytiniotis, SLP Jones, J Breitner Journal of Functional Programming 27, e11, 2017 | 13 | 2017 |
On improvements of low-deterministic security J Breitner, J Graf, M Hecker, M Mohr, G Snelting Principles of Security and Trust: 5th International Conference, POST 2016 …, 2016 | 13 | 2016 |
Lazy Evaluation: From natural semantics to a machine-checked compiler transformation J Breitner Karlsruhe Institute of Technology, 2016 | 12 | 2016 |
The correctness of Launchbury's natural semantics for lazy evaluation J Breitner arXiv preprint arXiv:1405.3099, 2014 | 11 | 2014 |
The verse calculus: a core calculus for deterministic functional logic programming L Augustsson, J Breitner, K Claessen, R Jhala, S Peyton Jones, O Shivers, ... Proceedings of the ACM on Programming Languages 7 (ICFP), 417-447, 2023 | 10 | 2023 |
Call arity J Breitner International Symposium on Trends in Functional Programming, 34-50, 2014 | 10 | 2014 |
Low-deterministic security for low-nondeterministic programs S Bischof, J Breitner, J Graf, M Hecker, M Mohr, G Snelting Journal of Computer Security 26 (3), 335-366, 2018 | 9 | 2018 |
A promise checked is a promise kept: inspection testing J Breitner Proceedings of the 11th ACM SIGPLAN International Symposium on Haskell, 14-25, 2018 | 8 | 2018 |
Type variables in patterns RA Eisenberg, J Breitner, S Peyton Jones ACM SIGPLAN Notices 53 (7), 94-105, 2018 | 8 | 2018 |