The quasi-Newton least squares method: A new and fast secant method analyzed for linear systems R Haelterman, J Degroote, D Van Heule, J Vierendeels SIAM Journal on numerical analysis 47 (3), 2347-2368, 2009 | 71 | 2009 |
Applications of SAT solvers in cryptanalysis: finding weak keys and preimages F Lafitte, J Nakahara Jr, D Van Heule Journal on Satisfiability, Boolean Modeling and Computation 9 (1), 1-25, 2014 | 39 | 2014 |
On the similarities between the quasi-Newton inverse least squares method and GMRes R Haelterman, J Degroote, D Van Heule, J Vierendeels SIAM journal on numerical analysis 47 (6), 4660-4679, 2010 | 38 | 2010 |
SAT-based cryptanalysis of ACORN F Lafitte, L Lerman, O Markowitch, D Van Heule Cryptology ePrint Archive, 2016 | 22 | 2016 |
Cryptographic Boolean functions with R F Lafitte, D Van Heule Methods 1 (1), 1, 2011 | 15 | 2011 |
SAT based analysis of LTE stream cipher ZUC F Lafitte, O Markowitch, D Van Heule Proceedings of the 6th International Conference on Security of Information …, 2013 | 14 | 2013 |
Non-stationary two-stage relaxation based on the principle of aggregation multi-grid R Haelterman, J Vierendeels, D Van Heule Computational Fluid Dynamics 2006: Proceedings of the Fourth International …, 2009 | 14 | 2009 |
A generalization of the Runge–Kutta iteration R Haelterman, J Vierendeels, D Van Heule Journal of computational and applied mathematics 224 (1), 152-167, 2009 | 10 | 2009 |
Secure and practical threshold RSA J Dossogne, F Lafitte, D Van Heule Proceedings of the 6th International Conference on Security of Information …, 2013 | 7 | 2013 |
Optimization of the Runge–Kutta iteration with residual smoothing R Haelterman, J Vierendeels, D Van Heule Journal of computational and applied mathematics 234 (1), 253-271, 2010 | 6 | 2010 |
The non-definedness notion in expert systems D Van Heule, A Hoogewijs, N Slaats Information Sciences 114 (1-4), 53-62, 1999 | 2 | 1999 |
Safe cryptographic random number generation using untrusted generators H Bruyninckx, F Lafitte, D Van Heule 2014 IEEE International Conference on Communications (ICC), 731-736, 2014 | 1 | 2014 |
Multi-stage solvers optimized for damping and propagation R Haelterman, J Vierendeels, D Van Heule, S De Ridder, H Bruyninckx Journal of computational and applied mathematics 235 (13), 3775-3782, 2011 | 1 | 2011 |
Extending Broyden's method to interaction problems R Haelterman, J Degroote, J Vierendeels Revue d'analyse numérique et de théorie de l'approximation 37 (2), 169-180, 2008 | 1 | 2008 |
Runge-Kutta iteration with residual smoothing R Haelterman, J Vierendeels, D Van Heule | | 2016 |
Arbitrated Secure Authentication realized by using quantum principles H Bruyninckx, D Van Heule 2015 IEEE International Conference on Communications (ICC), 7420-7425, 2015 | | 2015 |
damping and propagation R Haelterman, J Vierendeels, D Van Heule, S De Ridder, H Bruyninckx | | 2010 |
A new quasi-newton secant method for arbitrary black-box linear problems R Haelterman, J Degroote, D Van Heule, J Vierendeels 9th IMACS International Symposium on Iterative Methods in Scientific …, 2008 | | 2008 |
Variable two-stage relaxation based on the principle of aggregation multi-grid R Haelterman, J Vierendeels, D Van Heule ECCOMAS CFD 2006: Proceedings of the European Conference on Computational …, 2006 | | 2006 |
An analytical quantification of the optimization of multi-stage solvers: the scalar case R Haelterman, J Vierendeels, D VAN HEULE Book of abstracts of the 12th international congress on computational and …, 2006 | | 2006 |