]. D. Bo, M. K. Boneh, ]. E. Br-kn, H. Brieskorn, and . Knörrer, Franklin Identity-Based Encryption from the Weil Pairing CRYPTO Plane algebraic curves, 1986.

]. D. Du-fo, R. M. Dummit, and . Foote, Abstract Algebra, 1991.

]. R. Fa and . Farashahi, Hashing into Hessian Curves, Cryptology ePrint Archive Report, vol.373, 2010.

]. J. Hi and . Hirschfeld, Projective geometries over finite fields. Oxford Mathematical Monographs, 1998.

]. J. Hi-ko-to, G. Hirschfeld, F. Korchmàros, and . Torres, Algebraic curves over a finite field, 2008.

]. T. Ic and . Icart, How to hash into elliptic curves, Proceedings of CRYPTO 2009, pp.303-316, 2009.

[. Kammerer, R. Lercier, and G. Renault, Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time, International Conference on Pairing-Based Cryptography, 2010.
DOI : 10.1007/978-3-642-17455-1_18

URL : https://hal.archives-ouvertes.fr/hal-00694136

]. A. Sh-wo, C. Shallue, and . Van-de-woestijne, Construction of Rational Points on Elliptic Curves over Finite Fields, Lecure Notes in Computer Science, vol.4076, pp.510-524, 2006.

]. J. Se-wi-pr, F. Sendra, S. Winkler, and . Prez-diaz, Rational Algebraic Curves: A Computer Algebra Approach, 2007.

]. R. Se-se, J. Sendra, and . Sevilla, Radical Parametrization of Algebraic Curves by Adjoint Curves. ArXiv e-prints 0805, 2008.