Binary Elligator Squared, LNCS, vol.8781, pp.20-37, 2014. ,
DOI : 10.1007/978-3-319-13051-4_2
URL : https://hal.archives-ouvertes.fr/hal-01094083
Elligator, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013. ,
DOI : 10.1145/2508859.2516734
Identity-based encryption from the Weil pairing, LNCS, vol.2139, pp.213-229, 2001. ,
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves, LNCS, vol.6223, pp.237-254, 2010. ,
DOI : 10.1007/978-3-642-14623-7_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.591.4859
Mixed exponential sums over finite fields, Proc. Amer, pp.2529-2537, 2000. ,
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves, Mathematics of Computation, vol.82, issue.281, pp.491-512, 2013. ,
DOI : 10.1090/S0025-5718-2012-02606-8
Injective Encodings to Elliptic Curves, LNCS, vol.7959, pp.203-218, 2013. ,
DOI : 10.1007/978-3-642-39059-3_14
URL : https://hal.archives-ouvertes.fr/hal-01094294
Global construction of general exceptional covers, Finite Fields: Theory, Applications, and Algorithms, number 168 in Contemporary Mathematics, pp.69-100, 1994. ,
How to Hash into Elliptic Curves, LNCS, vol.5677, pp.303-316, 2009. ,
DOI : 10.1007/978-3-642-03356-8_18
Improved elliptic curve hashing and point representation. IACR Cryptology ePrint Archive, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01275711
Construction of Rational Points on Elliptic Curves over Finite Fields, LNCS, vol.4076, pp.510-524, 2006. ,
DOI : 10.1007/11792086_36
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings, Financial Cryptography, pp.139-156, 2014. ,
DOI : 10.1007/978-3-662-45472-5_10
Impossibility of Surjective Icart-Like Encodings, ProvSec, pp.29-39, 2014. ,
DOI : 10.1007/978-3-319-12475-9_3