default search action
Peter T. Breuer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c50]Peter T. Breuer:
High Speed Encrypted Computing: Stochastic Confusion and Lies in a Secret Computer. DSC 2022: 1-8 - 2021
- [c49]Jonathan P. Bowen, Peter T. Breuer:
Formal Methods Communities of Practice: A Survey of Personal Experience. SEFM Workshops 2021: 287-301 - [i17]Peter T. Breuer:
An Obfuscating C Compiler for Encrypted Computing. CoRR abs/2112.13672 (2021)
2010 – 2019
- 2019
- [j17]Peter T. Breuer, Jonathan P. Bowen:
Fully encrypted high-speed microprocessor architecture: the secret computer in simulation. Int. J. Crit. Comput. Based Syst. 9(1/2): 26-55 (2019) - [c48]Peter T. Breuer, Simon J. Pickin:
A Calculus of Chaos in Stochastic Compilation - Engineering in the Cause of Mathematics. FM Workshops (2) 2019: 167-184 - [c47]Peter T. Breuer, Jonathan P. Bowen:
Safe Compilation for Hidden Deterministic Hardware Aliasing. ISSRE Workshops 2019: 422-427 - [c46]Peter T. Breuer, Jonathan P. Bowen:
Chaotic Compilation: A (Statistical) Cloak for a Secret Computer. ISSRE Workshops 2019: 428-433 - [i16]Peter T. Breuer:
Safe Compilation for Hidden Deterministic Hardware Aliasing and Encrypted Computing. CoRR abs/1901.10926 (2019) - [i15]Peter T. Breuer:
Compiled Obfuscation for Data Structures in Encrypted Computing. CoRR abs/1902.06146 (2019) - [i14]Peter T. Breuer:
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name. CoRR abs/1904.09429 (2019) - [i13]Peter T. Breuer:
Safe and Chaotic Compilation for Hidden Deterministic Hardware Aliasing. CoRR abs/1905.08240 (2019) - [i12]Peter T. Breuer:
An Information Obfuscation Calculus for Encrypted Computing. IACR Cryptol. ePrint Arch. 2019: 84 (2019) - [i11]Peter T. Breuer, Simon Pickin:
Safe Compilation for Encrypted Computing. IACR Cryptol. ePrint Arch. 2019: 301 (2019) - [i10]Peter T. Breuer:
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name. IACR Cryptol. ePrint Arch. 2019: 423 (2019) - 2018
- [c45]Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu:
The Secret Processor Will Go to the Ball: Benchmark Insider-Proof Encrypted Computing. EuroS&P Workshops 2018: 145-152 - [c44]Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu:
On Security in Encrypted Computing. ICICS 2018: 192-211 - [c43]Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu:
Superscalar Encrypted RISC: The Measure of a Secret Computer. TrustCom/BigDataSE 2018: 1336-1341 - [i9]Peter T. Breuer, Jonathan P. Bowen:
(Un)Encrypted Computing and Indistinguishability Obfuscation. CoRR abs/1811.12365 (2018) - 2017
- [c42]Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu:
Encrypted computing: Speed, security and provable obfuscation against insiders. ICCST 2017: 1-6 - [c41]Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu:
On Obfuscating Compilation for Encrypted Computing. SECRYPT 2017: 247-254 - [i8]Peter T. Breuer:
An Obfuscating Compiler. IACR Cryptol. ePrint Arch. 2017: 50 (2017) - 2016
- [c40]Peter T. Breuer, Jonathan P. Bowen:
A Fully Encrypted Microprocessor The Secret Computer is Nearly Here. ANT/SEIT 2016: 1282-1287 - [c39]Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu:
A Practical Encrypted Microprocessor. SECRYPT 2016: 239-250 - [i7]Peter T. Breuer, Jonathan P. Bowen:
On the Security of Practical and Complete Homomorphic Encrypted Computation. IACR Cryptol. ePrint Arch. 2016: 1191 (2016) - [i6]Peter T. Breuer, Jonathan P. Bowen:
Superscalar Encrypted RISC: A Secret Computer in Simulation. IACR Cryptol. ePrint Arch. 2016: 1193 (2016) - 2015
- [c38]Peter T. Breuer, Jonathan P. Bowen, Simon Pickin:
Processor Rescue - Safe Coding for Hardware Aliasing. SoMeT 2015: 137-148 - [i5]Peter T. Breuer, Jonathan P. Bowen:
A First Practical Fully Homomorphic Crypto-Processor Design: The Secret Computer is Nearly Here. CoRR abs/1510.05278 (2015) - 2014
- [j16]Peter T. Breuer, Simon Pickin:
Open source verification in an anonymous volunteer network. Sci. Comput. Program. 91: 161-187 (2014) - [c37]Peter T. Breuer, Jonathan P. Bowen:
Idea: Towards a Working Fully Homomorphic Crypto-processor - Practice and the Secret Computer. ESSoS 2014: 131-140 - [c36]Peter T. Breuer, Jonathan P. Bowen:
Avoiding Hardware Aliasing: Verifying RISC Machine and Assembly Code for Encrypted Computing. ISSRE Workshops 2014: 365-370 - [c35]Peter T. Breuer, Jonathan P. Bowen:
Empirical Patterns in Google Scholar Citation Counts. SOSE 2014: 398-403 - [i4]Peter T. Breuer, Jonathan P. Bowen:
Empirical Patterns in Google Scholar Citation Counts. CoRR abs/1401.1861 (2014) - [i3]Peter T. Breuer, Jonathan P. Bowen:
On the Security of Fully Homomorphic Encryption and Encrypted Computing: Is Division safe? CoRR abs/1411.4813 (2014) - 2013
- [c34]Peter T. Breuer, Jonathan P. Bowen:
A Fully Homomorphic Crypto-Processor Design. ESSoS 2013: 123-138 - [c33]Peter T. Breuer, Jonathan P. Bowen:
Certifying Machine Code Safe from Hardware Aliasing: RISC is Not Necessarily Risky. SEFM Workshops 2013: 371-388 - [c32]Peter T. Breuer, Simon Pickin:
Soundness and Completeness of the NRB Verification Logic. SEFM Workshops 2013: 389-404 - [i2]Peter T. Breuer, Jonathan P. Bowen:
Towards Proving RISC Machine Code not Risky with respect to Memory Aliasing. CoRR abs/1305.6431 (2013) - [i1]Peter T. Breuer, Simon Pickin:
Soundness and Completeness of the NRB Verification Logic. CoRR abs/1306.5585 (2013) - 2012
- [c31]Peter T. Breuer, Jonathan P. Bowen:
Typed Assembler for a RISC Crypto-Processor. ESSoS 2012: 22-29 - 2010
- [j15]Ernesto Damiani, Luís Soares Barbosa, Peter T. Breuer, Claudio A. Ardagna:
Special issue: Open Source Certification. Comput. Syst. Sci. Eng. 25(4) (2010) - [j14]Peter T. Breuer, Simon Pickin:
Open Source Verification under a Cloud. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 33 (2010) - [j13]Peter T. Breuer, Simon Pickin:
A formal nethod (a networked formal method). Innov. Syst. Softw. Eng. 6(4): 255-268 (2010)
2000 – 2009
- 2008
- [j12]Peter T. Breuer, Simon Pickin:
Approximate verification in an open source world. Innov. Syst. Softw. Eng. 4(1): 87-105 (2008) - 2007
- [c30]Peter T. Breuer, Simon Pickin:
Verification in the Light and Large: Large-Scale Verification for Fast-Moving Open Source C Projects. SEW 2007: 246-255 - 2006
- [j11]Peter T. Breuer, Simon Pickin:
Symbolic approximation: an approach to verification in the large. Innov. Syst. Softw. Eng. 2(3-4): 147-163 (2006) - [j10]Peter T. Breuer, Marisol García-Valls:
Raiding the Noosphere: the open development of networked RAID support for the Linux kernel. Softw. Pract. Exp. 36(4): 365-395 (2006) - [c29]Peter T. Breuer, Simon Pickin:
One Million (LOC) and Counting: Static Analysis for Errors and Vulnerabilities in the Linux Kernel Source Code. Ada-Europe 2006: 56-70 - [c28]Peter T. Breuer, Simon Pickin:
Checking for Deadlock, Double-Free and Other Abuses in the Linux Kernel Source Code. International Conference on Computational Science (4) 2006: 765-772 - [c27]Peter T. Breuer, Simon Pickin:
Verification in the Large via Symbolic Approximation. ISoLA 2006: 408-415 - [c26]Peter T. Breuer, Simon Pickin, María M. Larrondo-Petrie:
Detecting Deadlock, Double-Free and Other Abuses in a Million Lines of Linux Kernel Source. SEW 2006: 223-233 - 2005
- [c25]Peter T. Breuer, Arne Wiebalck:
Dependable Networked RAID for the Open Source Community. ICPADS (1) 2005: 627-633 - [c24]Peter T. Breuer, Arne Wiebalck:
Intelligent Networked Software RAID. Parallel and Distributed Computing and Networks 2005: 517-522 - 2004
- [c23]Peter T. Breuer, Marisol García-Valls:
Static Deadlock Detection in the Linux Kernel. Ada-Europe 2004: 52-64 - 2003
- [c22]Vicente Luque Centeno, Carlos Delgado Kloos, Peter T. Breuer, Luis Sánchez Fernández, Ma. Eugenia Gonzalo Cabellos, Juan Antonio Herráiz Pérez:
Automation of the Deep Web with User Defined Behaviours. AWIC 2003: 339-348 - [c21]Arne Wiebalck, Peter T. Breuer, Volker Lindenstruth, Timm M. Steinbeck:
Fault-Tolerant Distributed Mass Storage for LHC Computing. CCGRID 2003: 266-273 - [c20]Peter T. Breuer:
A Formal Model for the Block Device Subsystem of the Linux Kernel. ICFEM 2003: 599-619 - [c19]Vicente Luque Centeno, Luis Sánchez Fernández, Carlos Delgado Kloos, Peter T. Breuer, Fernando Paniagua Martín:
Building Wrapper Agents for the Deep Web. ICWE 2003: 58-67 - [c18]Vicente Luque Centeno, Peter T. Breuer, Luis Sánchez Fernández, Carlos Delgado Kloos, Juan Antonio Herráiz Pérez:
MSC-based Language for Specifying Automated Web Clients. ISCC 2003: 407-412 - 2002
- [c17]Peter T. Breuer, Carlos Delgado Kloos, Vicente Luque Centeno, Luis Sánchez Fernández:
Higher Order Applicative XML Documents. RISSEF 2002: 91-107 - 2001
- [c16]Celeste Campo, Andrés Marín López, Arturo García, Ignacio Díaz, Peter T. Breuer, Carlos Delgado Kloos, Carlos García:
JCCM: Flexible Certificates for Smartcards with Java Card. E-smart 2001: 34-42
1990 – 1999
- 1999
- [c15]Peter T. Breuer, Natividad Martínez Madrid, Jonathan P. Bowen, Robert B. France, Maria M. Larrondo-Petrie, Carlos Delgado Kloos:
Reasoning about VHDL and VHDL-AMS using Denotational Semantics. DATE 1999: 346-352 - 1998
- [c14]Peter T. Breuer, Natividad Martínez Madrid, Carlos Delgado Kloos:
The Computational Description of Analogue System Behaviour. Prospects for Hardware Foundations 1998: 309-332 - 1997
- [j9]Peter T. Breuer, Carlos Delgado Kloos, Andrés Marín López, Natividad Martínez Madrid, Luis Sánchez Fernández:
A Refinement Calculus for the Synthesis of Verified Hardware Descriptions in VHDL. ACM Trans. Program. Lang. Syst. 19(4): 585-616 (1997) - [c13]Natividad Martínez Madrid, Peter T. Breuer, Carlos Delgado Kloos:
A semantic model for VHDL-AMS. CHARME 1997: 106-123 - 1996
- [c12]Peter T. Breuer, Natividad Martínez Madrid, Luis Sánchez, Andrés Marín, Carlos Delgado Kloos:
A Formal Method for Specification and Refinement of Real-Time Systems. RTS 1996: 200-204 - [c11]Peter T. Breuer, Carlos Delgado Kloos, Natividad Martínez Madrid, Luis Sánchez, Andrés Marín:
A refinement calculus for VHDL. EURO-DAC 1996: 482-487 - 1995
- [j8]Peter T. Breuer, Luis Sánchez Fernández, Carlos Delgado Kloos:
A Simple Denotational Semantics, Proof Theory and a Validation Condition Generator for Unit-Delay VHDL. Formal Methods Syst. Des. 7(1/2): 27-51 (1995) - [j7]Peter T. Breuer, Jonathan P. Bowen:
A PREttier Compiler-Compiler: Generating Higher-order Parsers in C. Softw. Pract. Exp. 25(11): 1263-1297 (1995) - [c10]Peter T. Breuer, Natividad Martínez Madrid:
A native process algebra for VHDL. EURO-DAC 1995: 420-426 - 1994
- [j6]Giorgos Papapanagiotakis, Peter T. Breuer:
A software maintenance management model based on queueing networks. J. Softw. Maintenance Res. Pract. 6(2): 73-97 (1994) - [j5]Peter T. Breuer, Jonathan P. Bowen:
Decompilation: The Enumeration of Types and Grammars. ACM Trans. Program. Lang. Syst. 16(5): 1613-1647 (1994) - [c9]Luis Sánchez Fernández, Peter T. Breuer, Carlos Delgado Kloos:
Proof theory and a validation condition generator for VHDL. EURO-DAC 1994: 512-517 - [c8]Peter T. Breuer, Luis Sánchez Fernández, Carlos Delgado Kloos:
Clean formal semantics for VHDL. EDAC-ETC-EUROASIC 1994: 641-647 - [c7]Peter T. Breuer, Luis Sánchez, Carlos Delgado Kloos:
Proving Hardware Designs. ICLP 1994: 745 - [c6]Peter T. Breuer, Jonathan P. Bowen:
Towards Correct Executable Semantics for Z. Z User Workshop 1994: 185-209 - 1993
- [j4]Jonathan P. Bowen, Peter T. Breuer, Kevin Lano:
A compendium of formal techniques for software maintenance. Softw. Eng. J. 8(5): 253-262 (1993) - [j3]Jonathan P. Bowen, Peter T. Breuer, Kevin Lano:
Formal specifications in software maintenance: from code to Z++ and back again. Inf. Softw. Technol. 35(11-12): 679-690 (1993) - [j2]Kevin Lano, Peter T. Breuer, Howard P. Haughton:
Reverse-engineering Cobol via formal methods. J. Softw. Maintenance Res. Pract. 5(1): 13-35 (1993) - 1992
- [c5]Peter T. Breuer:
The Art of Computer Un-Programming: Reverse Engineering in Prolog. Logic Programming Summer School 1992: 290-302 - [c4]Peter T. Breuer, Jonathan P. Bowen:
Decompilation is the Efficient Enumeration of Types. WSA 1992: 255-273 - 1991
- [j1]Peter T. Breuer, Kevin Lano:
Creating specifications from code: Reverse-engineering techniques. J. Softw. Maintenance Res. Pract. 3(3): 145-162 (1991) - [c3]Peter T. Breuer:
An Analysis/Synthesis Language with Learning Strategies. JTASPEFT/WSA 1991: 202-209 - 1990
- [c2]Peter T. Breuer:
Z! in Progress: Maintaining Z Specifications. Z User Workshop 1990: 295-318
1980 – 1989
- 1989
- [c1]Kevin Lano, Peter T. Breuer:
From Programs to Z Specifications. Z User Workshop 1989: 46-70
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-16 18:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint