{"description":"\u554f\u984c\u6982\u8981 http://judge.u-aizu.ac.jp/onlinejudge/description.jsp?id=1250 9\u3064\u306e\u6570\u5b57\u304c\u4e0e\u3048\u3089\u308c\u308b\u3002\u6700\u521d\u306e8\u3064\u304c\u6697\u53f7\u5316\u3055\u308c\u305f16\u9032\u6570\u306e\u6570\u5b57\u30019\u3064\u76ee\u304c\u30c1\u30a7\u30c3\u30af\u30b5\u30e0\u3067\u3042\u308b\u3002\u3057\u304b\u3057\u3001\u3053\u306e\u6697\u53f7\u5316\u306b\u306f\u8106\u5f31\u6027\u304c\u3042\u308b\u3002\u3053\u308c\u3089\u306e\u6697\u53f7\u306f8\u3064\u306e\u6697\u53f7\u5316\u3055\u308c\u308b\u524d\u306e\u6570\u5b57\u3092 C_1, C_2, ... C_8\u3001\u6697\u53f7\u5316\u306e\u30ad\u30fc\u3092K\u3001\u30c1\u30a7\u30c3\u30af\u30b5\u30e0\u3092S\u3068\u3059\u308b\u3068\u3002 {(C_1 ^ K) + (C_2 ^ K) + ... + (C_8 ^ K)} % 232 = SK \u3068\u306a\u308b\u3002C_1, ... C_8 \u3068 S \u304c\u4e0e\u3048\u3089\u308c\u3068K\u304c\u5206\u304b\u3063\u3066\u3057\u307e\u3046\u306e\u3067\u3042\u308b\u3002\u3053\u306eK\u3092\u6c42\u3081\u3088\u3002 \u65b9\u91dd \u2026","height":"190","author_url":"https://blog.hatena.ne.jp/yoshiki_utakata/","provider_url":"https://hatena.blog","categories":[],"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fwww.utakata.work%2Fentry%2F2015%2F05%2F31%2F213245\" title=\"AOJ 1250: Leaky Cryptography - \u732b\u3067\u3082\u308f\u304b\u308bWeb\u958b\u767a\u30fb\u30d7\u30ed\u30b0\u30e9\u30df\u30f3\u30b0\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","version":"1.0","published":"2015-05-31 21:32:45","provider_name":"Hatena Blog","title":"AOJ 1250: Leaky Cryptography","width":"100%","author_name":"yoshiki_utakata","blog_url":"https://www.utakata.work/","url":"https://www.utakata.work/entry/2015/05/31/213245","blog_title":"\u732b\u3067\u3082\u308f\u304b\u308bWeb\u958b\u767a\u30fb\u30d7\u30ed\u30b0\u30e9\u30df\u30f3\u30b0","image_url":null,"type":"rich"}