D. F. Aranha, P. Fouque, C. Qian, M. Tibouchi, and J. Zapalowicz, Binary Elligator Squared, LNCS, vol.8781, pp.20-37, 2014.
DOI : 10.1007/978-3-319-13051-4_2

URL : https://hal.archives-ouvertes.fr/hal-01094083

D. J. Bernstein, M. Hamburg, A. Krasnova, and T. Lange, Elligator, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013.
DOI : 10.1145/2508859.2516734

D. Boneh and M. K. Franklin, Identity-based encryption from the Weil pairing, LNCS, vol.2139, pp.213-229, 2001.

E. Brier, J. Coron, T. Icart, D. Madore, H. Randriam et al., Efficient Indifferentiable Hashing into Ordinary Elliptic Curves, LNCS, vol.6223, pp.237-254, 2010.
DOI : 10.1007/978-3-642-14623-7_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

F. N. Castro and C. J. Moreno, Mixed exponential sums over finite fields, Proc. Amer, pp.2529-2537, 2000.

R. R. Farashahi, P. Fouque, I. Shparlinski, M. Tibouchi, and J. F. Voloch, Indifferentiable deterministic hashing to elliptic and hyperelliptic curves, Mathematics of Computation, vol.82, issue.281, pp.491-512, 2013.
DOI : 10.1090/S0025-5718-2012-02606-8

P. Fouque, A. Joux, and M. Tibouchi, Injective Encodings to Elliptic Curves, LNCS, vol.7959, pp.203-218, 2013.
DOI : 10.1007/978-3-642-39059-3_14

URL : https://hal.archives-ouvertes.fr/hal-01094294

M. D. Fried, Global construction of general exceptional covers, Finite Fields: Theory, Applications, and Algorithms, number 168 in Contemporary Mathematics, pp.69-100, 1994.

T. Icart, How to Hash into Elliptic Curves, LNCS, vol.5677, pp.303-316, 2009.
DOI : 10.1007/978-3-642-03356-8_18

T. Kim and M. Tibouchi, Improved elliptic curve hashing and point representation. IACR Cryptology ePrint Archive, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01275711

A. Shallue and C. Van-de-woestijne, Construction of Rational Points on Elliptic Curves over Finite Fields, LNCS, vol.4076, pp.510-524, 2006.
DOI : 10.1007/11792086_36

M. Tibouchi, Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings, Financial Cryptography, pp.139-156, 2014.
DOI : 10.1007/978-3-662-45472-5_10

M. Tibouchi, Impossibility of Surjective Icart-Like Encodings, ProvSec, pp.29-39, 2014.
DOI : 10.1007/978-3-319-12475-9_3