Power of Cryptography uva113

A – Power of Cryptography uva113

Time Limit:3000MSMemory Limit:0KB64bit IO Format:%lld & %llu Submit Status Practice UVA 113 Appoint description: Background Current work in cryptography involves (among other things) large prime numbers and computing powers of numbers modulo functions of these primes. Work in this area has resulted in the practical use of results from number theory and other branches of mathematics once considered to be of only theoretical interest. This problem involves the efficient computation of integer roots of numbers. The Problem Given an integer tex2html_wrap_inline32 and an integer tex2html_wrap_inline34 you are to write a program that determines tex2html_wrap_inline36 , the positive tex2html_wrap_inline38 root of p. In this problem, given such integers n and p, p will always be of the form tex2html_wrap_inline48 for an integer k (this integer is what your program must find). The Input The input consists of a sequence of integer pairs n and p with each integer on a line by itself. For all such pairs tex2html_wrap_inline56 , tex2html_wrap_inline58 and there exists an integer k, tex2html_wrap_inline62 such that tex2html_wrap_inline64 . The Output For each integer pair n and p the value tex2html_wrap_inline36 should be printed, i.e., the number k such that tex2html_wrap_inline64 . Sample Input 2 16 3 27 7 4357186184021382204544 Sample Output 4 3 1234 利用pow函数的开p次方

;const int maxn=50005;LL;int main(){ //freopen(“Text//in.txt”,”r”,stdin);double p;int n;while(~scanf(“%d%lf”,&n,&p)){printf(“%.0lf\n”,pow(p,1./n));}return 0;}

,离开睁眼闭眼看见的城市,逃离身边的纷纷扰扰,

Power of Cryptography uva113

相关文章:

你感兴趣的文章:

标签云: