701 research outputs found

    Doing Business in Mexico

    Get PDF
    [Excerpt] This memorandum provides a general summary of certain aspects of Mexican law, which may be of interest to foreign companies considering doing business in Mexico. The areas of law summarized in this memorandum include: 1. Foreign Investment Law; 2. Competition Law 3. Maquiladora Operations; 4. Company Law; 5. Taxes; 6. International Trade; 7. Labor Law; 8. Environmental; and 9. Intellectual Property. Treaties, to which Mexico is a party, particularly the North American Free Trade Agreement (the “NAFTA”) among Canada, Mexico and the United States, may affect investors from certain countries and may modify the preceding areas of Mexican law..… Although this memorandum makes numerous references to NAFTA and other treaties, it does not comprehensively address all instances in which Mexican law is modified or complemented thereby

    A Family of Binary Sequences with Optimal Correlation Property and Large Linear Span

    Full text link
    A family of binary sequences is presented and proved to have optimal correlation property and large linear span. It includes the small set of Kasami sequences, No sequence set and TN sequence set as special cases. An explicit lower bound expression on the linear span of sequences in the family is given. With suitable choices of parameters, it is proved that the family has exponentially larger linear spans than both No sequences and TN sequences. A class of ideal autocorrelation sequences is also constructed and proved to have large linear span.Comment: 21 page

    A Hardware Oriented Method to Generate and Evaluate Nonlinear Interleaved Sequences with Desired properties

    Get PDF
    It is well known that the combinatorial structure, algebraic structure and D-transform based method render the nonlinear sequences with good autocorrelation function (ACF) and great linear complexity (LC). However, “all sequences” are not equal even if they are “born” by the same method! In this paper the big inequalities regarding LC of these sequences are shown based on a hardware oriented method (D-transform). In order to get the right sequences some more extensive simulations and trade off are needed. That is why this paper is represented here with above Title. Keywords: cryptography, mobile communications, security, watermarking, D-transfor

    The combinatorics of binary arrays

    Get PDF
    This paper gives an account of the combinatorics of binary arrays, mainly concerning their randomness properties. In many cases the problem reduces to the investigation on difference sets.postprin

    A note on low correlation zone signal sets

    Get PDF
    Abstract. In this note, we present a connection between designing low correlation zone (LCZ) sequences and the results of correlation of sequences with subfield decompositions presented in a recent book by the first two authors [2]. This results in low correlation zone signal sets with huge sizes over three different alphabetic sets: finite field of size q, integer residue ring modulo q, and the subset in the complex field which consists of powers of a primitive q-th root of unity. We also provide two open problems along this direction. Index Terms: low correlation zone sequences, subfield reducible sequences, two-tuple balance property.

    XONN: XNOR-based Oblivious Deep Neural Network Inference

    Get PDF
    Advancements in deep learning enable cloud servers to provide inference-as-a-service for clients. In this scenario, clients send their raw data to the server to run the deep learning model and send back the results. One standing challenge in this setting is to ensure the privacy of the clients' sensitive data. Oblivious inference is the task of running the neural network on the client's input without disclosing the input or the result to the server. This paper introduces XONN, a novel end-to-end framework based on Yao's Garbled Circuits (GC) protocol, that provides a paradigm shift in the conceptual and practical realization of oblivious inference. In XONN, the costly matrix-multiplication operations of the deep learning model are replaced with XNOR operations that are essentially free in GC. We further provide a novel algorithm that customizes the neural network such that the runtime of the GC protocol is minimized without sacrificing the inference accuracy. We design a user-friendly high-level API for XONN, allowing expression of the deep learning model architecture in an unprecedented level of abstraction. Extensive proof-of-concept evaluation on various neural network architectures demonstrates that XONN outperforms prior art such as Gazelle (USENIX Security'18) by up to 7x, MiniONN (ACM CCS'17) by 93x, and SecureML (IEEE S&P'17) by 37x. State-of-the-art frameworks require one round of interaction between the client and the server for each layer of the neural network, whereas, XONN requires a constant round of interactions for any number of layers in the model. XONN is first to perform oblivious inference on Fitnet architectures with up to 21 layers, suggesting a new level of scalability compared with state-of-the-art. Moreover, we evaluate XONN on four datasets to perform privacy-preserving medical diagnosis.Comment: To appear in USENIX Security 201
    • …
    corecore