F.A.Q
Hand In Hand
Online Acmers
Problem Archive
Realtime Judge Status
Authors Ranklist
 
     C/C++/Java Exams     
ACM Steps
Go to Job
Contest LiveCast
ICPC@China
Best Coder beta
VIP | STD Contests
    DIY | Web-DIY beta
Author ID 
Password 
 Register new ID

Cipher

Time Limit: 2000/1000 MS (Java/Others)    Memory Limit: 32768/32768 K (Java/Others)
Total Submission(s): 138    Accepted Submission(s): 65


Problem Description
A spy is using a clever cipher technique to encode and decode messages.
The technique is very efficient as it enables him to send and receive any message, no matter how long it is with only three numbers!
After many great efforts, The Department of National Security managed to figure out how the technique works:
1. First of all, the only characters used are the space and lower case English letters. Each character is assigned an integer called the character volume, a space character has volume 1, ¡®a¡¯ has volume 2, ¡®b¡¯ has volume 3 and so on until ¡®z¡¯ which has volume 27. The volume of the whole message V is the sum of volumes of characters in the message.
2. A message consists of a number of words W, a word is a consecutive sequence of lower case letters, messages have no leading or trailing spaces and there is only one space between consecutive words.
3. For a certain V and W, let S be the lexicographically sorted set of messages that have volume V and consists of exactly W words. We can refer to a certain message using its one-based index I in S.
So when the spy wants to send a message M, he calculates its Volume V and the number of words it contains W and finds its index I in the corresponding set S (its index among all sorted messages of volume V with W words) and sends only three numbers along: V, W and I!
The Department of National Security has done a great effort so far, yet they seek your help to decode messages sent by the spy! That is, given V, W and I you must decrypt the spy¡¯s message or determine that there is no such one!
 

Input
The first line of input contains an integer (1 <= T <= 200), the number of test cases.
Each data set consists of a line with three integers the volume of the message (1 <= V <= 75), the number of words (1 <= W <= 20), and the index of message (1 <= I <= 1018).
 

Output
For each test case, print one line containing the decrypted message or ¡°Corrupted!¡± if there is no valid message corresponding to the given inputs.
 

Sample Input
3 7 2 3 2 1 2 50 2 39098532022
 

Sample Output
Case #1: aa a Case #2: Corrupted! Case #3: big bang
 

Hint

In the first test case, the sorted set of messages of volume 7 which contain 2 words is {¡°a aa¡±, ¡°a c¡±, ¡°aa a¡±,
¡°b b¡±, ¡°c a¡±}, hence the third and required message is ¡°aa a¡±.
In the second test case, the sorted set of messages of volume 2 which contain 1 word is {¡°a¡±}, the set has
only one message while index 2 is required, so something must have gone wrong!
 

Source
 

Statistic | Submit | Discuss | Note
Hangzhou Dianzi University Online Judge 3.0
Copyright © 2005-2024 HDU ACM Team. All Rights Reserved.
Designer & Developer : Wang Rongtao LinLe GaoJie GanLu
Total 0.000000(s) query 1, Server time : 2024-05-12 05:57:49, Gzip enabled