For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be
In this paper,a model with two mutual learning neural networks named Tree Parity Machine(TPM) is firstly introduced,as well as its cryptographic property of wei