C. Caesar Cipher
time limit per test
10 seconds
memory limit per test
256 megabytes
input
standard input
output
standard output

In cryptography, a Caesar cipher, also known as the shift cipher, is one of the most straightforward and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions up (or down) the alphabet.

For example, with the right shift of $$$19$$$, A would be replaced by T, B would be replaced by U, and so on. A full exhaustive list is as follows:

  • The plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z;
  • The ciphertext: T U V W X Y Z A B C D E F G H I J K L M N O P Q R S.

Now you have a plaintext and its ciphertext encrypted by a Caesar Cipher. You also have another ciphertext encrypted by the same method and are asked to decrypt it.

Input

The input contains several test cases, and the first line is a positive integer $$$T$$$ indicating the number of test cases which is up to $$$50$$$.

For each test case, the first line contains two integers $$$n$$$ and $$$m~(1 \le n,m \le 50)$$$ indicating the length of the first two texts (a plaintext and its ciphertext) and the length of the third text which will be given. Each of the second line and the third line contains a string only with capital letters of length $$$n$$$, indicating a given plaintext and its ciphertext respectively. The fourth line gives another ciphertext only with capital letters of length $$$m$$$.

We guarantee that the pair of given plaintext (in the second line) and ciphertext (in the third line) is unambiguous with a certain Caesar Cipher.

Output

For each test case, output a line containing Case #x: T, where x is the test case number starting from $$$1$$$, and T is the plaintext of the ciphertext given in the fourth line.

Example
Input
1
7 7
ACMICPC
CEOKERE
PKPIZKC
Output
Case #1: NINGXIA