{"trustable":true,"sections":[{"title":"","value":{"format":"HTML","content":"\u003cp\u003eHackers often have to crack passwords for different data encryption systems. A novice hacker Bill faced such a problem one day. After performing several experiments he noticed regularity in the formation of an encryption key. He knew that a key is an odd integer \u003cstrong\u003eK\u003c/strong\u003e, such that \u003cstrong\u003eK ^2\u003c/strong\u003e does not divide (\u003cstrong\u003eK\u003c/strong\u003e-\u003cstrong\u003e1\u003c/strong\u003e)\u003cstrong\u003e!\u003c/strong\u003e and its value is in the range \\[\u003cstrong\u003eA\u003c/strong\u003e; \u003cstrong\u003eB\u003c/strong\u003e\\] (\u003cstrong\u003eA\u003c/strong\u003e ≤ \u003cstrong\u003eK\u003c/strong\u003e ≤ \u003cstrong\u003eB\u003c/strong\u003e). Note, that (\u003cstrong\u003eK\u003c/strong\u003e-\u003cstrong\u003e1\u003c/strong\u003e)\u003cstrong\u003e!\u003c/strong\u003e \u003d (\u003cstrong\u003eK\u003c/strong\u003e-1\u003cstrong\u003e)\u003c/strong\u003e*(\u003cstrong\u003eK\u003c/strong\u003e-\u003cstrong\u003e2\u003c/strong\u003e)*...*\u003cstrong\u003e2\u003c/strong\u003e*\u003cstrong\u003e1\u003c/strong\u003e). He was not able to advance further due to his poor mathematics.\u003c/p\u003e\n\n\u003cp\u003eTo help young hacker you have to find all possible values of the key.\u003c/p\u003e\n\n\u003cp\u003e\u003ch2\u003eInput\u003c/h2\u003e\u003c/p\u003e\n\n\u003cp\u003eInput consists of two integers \u003cstrong\u003eA\u003c/strong\u003e and \u003cstrong\u003eB\u003c/strong\u003e (\u003cstrong\u003e3\u003c/strong\u003e ≤ \u003cstrong\u003eA\u003c/strong\u003e \u003c \u003cstrong\u003eB\u003c/strong\u003e ≤ \u003cstrong\u003e10^18\u003c/strong\u003e^\\{ \\}, \u003cstrong\u003eB\u003c/strong\u003e - \u003cstrong\u003eA\u003c/strong\u003e ≤ \u003cstrong\u003e100\u003c/strong\u003e).\u003c/p\u003e\n\n\u003cp\u003e\u003ch2\u003eOutput\u003c/h2\u003e\u003c/p\u003e\n\n\u003cp\u003eYour program has to print to a single line of output all possible values of key \u003cstrong\u003eK\u003c/strong\u003e in ascending order divided by a single space. It is guaranteed that there is at least one key in the range. Key values are output in ascending order.\u003c/p\u003e\n\n"}},{"title":"Example","value":{"format":"HTML","content":"\u003ctable class\u003d\u0027vjudge_sample\u0027\u003e\n\u003cthead\u003e\n \u003ctr\u003e\n \u003cth\u003eInput\u003c/th\u003e\n \u003cth\u003eOutput\u003c/th\u003e\n \u003c/tr\u003e\n\u003c/thead\u003e\n\u003ctbody\u003e\n \u003ctr\u003e\n \u003ctd\u003e\u003cpre\u003e3 100\n\u003c/pre\u003e\u003c/td\u003e\n \u003ctd\u003e\u003cpre\u003e3 5 7 9 11 13 17 19 23 29 31 37 41 43 47 53 59 61 67 71 73 79 83 89 97\n\u003c/pre\u003e\u003c/td\u003e\n \u003c/tr\u003e\n\u003c/tbody\u003e\n\u003c/table\u003e\n"}}]}