1. Alon, N., Goldreich, O., Håstad, J., Peralta, R.: Simple constructions of almost k-wise independent random variables. In: Proc. of the 31st FOCS, pp. 544–553 (1990)
2. Boyen, X.: Reusable cryptographic fuzzy extractors. In: Proceedings of the 11th ACM conference on Computer and Communications Security, pp. 82–91. ACM Press, New York (2004)
3. Chang, E.-C., Fedyukovych, V., Li, Q.: Secure sketch for multi-set difference. Cryptology ePrint Archive, Report, 2006/090 (2006), http://eprint.iacr.org/
4. Chang, E.-C., Shen, R., Teo, F.W.: Finding the original point set hidden among chaff. In: ASIACCS 2006 (to appear)
5. Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcard-based fingerprint authentication. In: ACM Workshop on Biometric Methods and Applications (2003)