Follow
Dirk Van Heule
Dirk Van Heule
Professor Em, Dept of Mathematics, Royal Military Academy
Verified email at rma.ac.be
Title
Cited by
Cited by
Year
The quasi-Newton least squares method: A new and fast secant method analyzed for linear systems
R Haelterman, J Degroote, D Van Heule, J Vierendeels
SIAM Journal on numerical analysis 47 (3), 2347-2368, 2009
712009
Applications of SAT solvers in cryptanalysis: finding weak keys and preimages
F Lafitte, J Nakahara Jr, D Van Heule
Journal on Satisfiability, Boolean Modeling and Computation 9 (1), 1-25, 2014
392014
On the similarities between the quasi-Newton inverse least squares method and GMRes
R Haelterman, J Degroote, D Van Heule, J Vierendeels
SIAM journal on numerical analysis 47 (6), 4660-4679, 2010
382010
SAT-based cryptanalysis of ACORN
F Lafitte, L Lerman, O Markowitch, D Van Heule
Cryptology ePrint Archive, 2016
222016
Cryptographic Boolean functions with R
F Lafitte, D Van Heule
Methods 1 (1), 1, 2011
152011
SAT based analysis of LTE stream cipher ZUC
F Lafitte, O Markowitch, D Van Heule
Proceedings of the 6th International Conference on Security of Information …, 2013
142013
Non-stationary two-stage relaxation based on the principle of aggregation multi-grid
R Haelterman, J Vierendeels, D Van Heule
Computational Fluid Dynamics 2006: Proceedings of the Fourth International …, 2009
142009
A generalization of the Runge–Kutta iteration
R Haelterman, J Vierendeels, D Van Heule
Journal of computational and applied mathematics 224 (1), 152-167, 2009
102009
Secure and practical threshold RSA
J Dossogne, F Lafitte, D Van Heule
Proceedings of the 6th International Conference on Security of Information …, 2013
72013
Optimization of the Runge–Kutta iteration with residual smoothing
R Haelterman, J Vierendeels, D Van Heule
Journal of computational and applied mathematics 234 (1), 253-271, 2010
62010
The non-definedness notion in expert systems
D Van Heule, A Hoogewijs, N Slaats
Information Sciences 114 (1-4), 53-62, 1999
21999
Safe cryptographic random number generation using untrusted generators
H Bruyninckx, F Lafitte, D Van Heule
2014 IEEE International Conference on Communications (ICC), 731-736, 2014
12014
Multi-stage solvers optimized for damping and propagation
R Haelterman, J Vierendeels, D Van Heule, S De Ridder, H Bruyninckx
Journal of computational and applied mathematics 235 (13), 3775-3782, 2011
12011
Extending Broyden's method to interaction problems
R Haelterman, J Degroote, J Vierendeels
Revue d'analyse numérique et de théorie de l'approximation 37 (2), 169-180, 2008
12008
Runge-Kutta iteration with residual smoothing
R Haelterman, J Vierendeels, D Van Heule
2016
Arbitrated Secure Authentication realized by using quantum principles
H Bruyninckx, D Van Heule
2015 IEEE International Conference on Communications (ICC), 7420-7425, 2015
2015
damping and propagation
R Haelterman, J Vierendeels, D Van Heule, S De Ridder, H Bruyninckx
2010
A new quasi-newton secant method for arbitrary black-box linear problems
R Haelterman, J Degroote, D Van Heule, J Vierendeels
9th IMACS International Symposium on Iterative Methods in Scientific …, 2008
2008
Variable two-stage relaxation based on the principle of aggregation multi-grid
R Haelterman, J Vierendeels, D Van Heule
ECCOMAS CFD 2006: Proceedings of the European Conference on Computational …, 2006
2006
An analytical quantification of the optimization of multi-stage solvers: the scalar case
R Haelterman, J Vierendeels, D VAN HEULE
Book of abstracts of the 12th international congress on computational and …, 2006
2006
The system can't perform the operation now. Try again later.
Articles 1–20