摘要:
The security of many ciphers strongly depends on the fact that the keys are unique and never re-used. This may be vitally important, since a relativel 阅读全文
摘要:
Fennec VS. Snuke Time limit : 2sec / Memory limit : 256MB Score : 400 points Problem Statement Fennec and Snuke are playing a board game. On the board 阅读全文
摘要:
Splitting Pile Time limit : 2sec / Memory limit : 256MB Score : 300 points Problem Statement Snuke and Raccoon have a heap of N cards. The i-th card f 阅读全文
摘要:
Exponentiation Description Problems involving the computation of exact values of very large magnitude and precision are common. For example, the compu 阅读全文
摘要:
Online Judge Problem Description Ignatius is building an Online Judge, now he has worked out all the problems except the Judge System. The system has 阅读全文
摘要:
Packets Description A factory produces products packed in square packets of the same height h and of the sizes 1*1, 2*2, 3*3, 4*4, 5*5, 6*6. These pro 阅读全文
摘要:
Nuske vs Phantom Thnook Time limit : 4sec / Memory limit : 256MB Score : 700 points Problem Statement Nuske has a grid with N rows and M columns of sq 阅读全文
摘要:
Time Limit: 2000/1000 MS (Java/Others) Memory Limit: 65536/32768 K (Java/Others) Total Submission(s): 728 Accepted Submission(s): 209 Problem Descript 阅读全文
摘要:
D - 3N Numbers Time limit : 2sec / Memory limit : 256MB Score : 500 points Problem Statement Let N be a positive integer. There is a numerical sequenc 阅读全文
摘要:
Chocolate Bar Time limit : 2sec / Memory limit : 256MB Score : 400 points Problem Statement There is a bar of chocolate with a height of H blocks and 阅读全文