TSTP Solution File: SWV233+1 by SnakeForV---1.0

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : SnakeForV---1.0
% Problem  : SWV233+1 : TPTP v8.1.0. Released v3.2.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s

% Computer : n002.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Wed Aug 31 18:44:34 EDT 2022

% Result   : Theorem 1.59s 0.55s
% Output   : Refutation 1.59s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :   23
%            Number of leaves      :   22
% Syntax   : Number of formulae    :  147 (  37 unt;   0 def)
%            Number of atoms       :  454 (  76 equ)
%            Maximal formula atoms :   11 (   3 avg)
%            Number of connectives :  544 ( 237   ~; 221   |;  65   &)
%                                         (   8 <=>;  13  =>;   0  <=;   0 <~>)
%            Maximal formula depth :   13 (   5 avg)
%            Maximal term depth    :    8 (   2 avg)
%            Number of predicates  :   11 (   9 usr;   9 prp; 0-2 aty)
%            Number of functors    :   22 (  22 usr;   9 con; 0-2 aty)
%            Number of variables   :  202 ( 202   !;   0   ?)

% Comments : 
%------------------------------------------------------------------------------
fof(f316,plain,
    $false,
    inference(avatar_sat_refutation,[],[f144,f155,f188,f231,f255,f272,f300,f311,f315]) ).

fof(f315,plain,
    ( ~ spl0_12
    | ~ spl0_15 ),
    inference(avatar_contradiction_clause,[],[f314]) ).

fof(f314,plain,
    ( $false
    | ~ spl0_12
    | ~ spl0_15 ),
    inference(subsumption_resolution,[],[f313,f86]) ).

fof(f86,plain,
    ~ knows(secret),
    inference(cnf_transformation,[],[f24]) ).

fof(f24,plain,
    ~ knows(secret),
    inference(flattening,[],[f20]) ).

fof(f20,negated_conjecture,
    ~ knows(secret),
    inference(negated_conjecture,[],[f19]) ).

fof(f19,conjecture,
    knows(secret),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',attack) ).

fof(f313,plain,
    ( knows(secret)
    | ~ spl0_12
    | ~ spl0_15 ),
    inference(subsumption_resolution,[],[f312,f271]) ).

fof(f271,plain,
    ( knows(kgen(k_a))
    | ~ spl0_12 ),
    inference(avatar_component_clause,[],[f269]) ).

fof(f269,plain,
    ( spl0_12
  <=> knows(kgen(k_a)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_12])]) ).

fof(f312,plain,
    ( ~ knows(kgen(k_a))
    | knows(secret)
    | ~ spl0_15 ),
    inference(resolution,[],[f299,f78]) ).

fof(f78,plain,
    ! [X0,X1] :
      ( ~ knows(symmetric_encrypt(X0,X1))
      | knows(X0)
      | ~ knows(X1) ),
    inference(cnf_transformation,[],[f57]) ).

fof(f57,plain,
    ! [X0,X1] :
      ( ~ knows(symmetric_encrypt(X0,X1))
      | knows(X0)
      | ~ knows(X1) ),
    inference(rectify,[],[f43]) ).

fof(f43,plain,
    ! [X1,X0] :
      ( ~ knows(symmetric_encrypt(X1,X0))
      | knows(X1)
      | ~ knows(X0) ),
    inference(flattening,[],[f42]) ).

fof(f42,plain,
    ! [X0,X1] :
      ( knows(X1)
      | ~ knows(symmetric_encrypt(X1,X0))
      | ~ knows(X0) ),
    inference(ennf_transformation,[],[f36]) ).

fof(f36,plain,
    ! [X0,X1] :
      ( ( knows(symmetric_encrypt(X1,X0))
        & knows(X0) )
     => knows(X1) ),
    inference(rectify,[],[f2]) ).

fof(f2,axiom,
    ! [X1,X0] :
      ( ( knows(symmetric_encrypt(X0,X1))
        & knows(X1) )
     => knows(X0) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',symmetric_encrypt_equation) ).

fof(f299,plain,
    ( knows(symmetric_encrypt(secret,kgen(k_a)))
    | ~ spl0_15 ),
    inference(avatar_component_clause,[],[f297]) ).

fof(f297,plain,
    ( spl0_15
  <=> knows(symmetric_encrypt(secret,kgen(k_a))) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_15])]) ).

fof(f311,plain,
    ~ spl0_14,
    inference(avatar_contradiction_clause,[],[f310]) ).

fof(f310,plain,
    ( $false
    | ~ spl0_14 ),
    inference(subsumption_resolution,[],[f309,f112]) ).

fof(f112,plain,
    knows(n),
    inference(resolution,[],[f73,f80]) ).

fof(f80,plain,
    ! [X0,X1] :
      ( ~ knows(concatenate(X0,X1))
      | knows(X0) ),
    inference(cnf_transformation,[],[f58]) ).

fof(f58,plain,
    ! [X0,X1] :
      ( ( knows(X0)
        & knows(X1) )
      | ~ knows(concatenate(X0,X1)) ),
    inference(rectify,[],[f49]) ).

fof(f49,plain,
    ! [X1,X0] :
      ( ( knows(X1)
        & knows(X0) )
      | ~ knows(concatenate(X1,X0)) ),
    inference(ennf_transformation,[],[f32]) ).

fof(f32,plain,
    ! [X0,X1] :
      ( knows(concatenate(X1,X0))
     => ( knows(X1)
        & knows(X0) ) ),
    inference(rectify,[],[f5]) ).

fof(f5,axiom,
    ! [X1,X0] :
      ( knows(concatenate(X0,X1))
     => ( knows(X1)
        & knows(X0) ) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',construct_message_2) ).

fof(f73,plain,
    knows(concatenate(n,concatenate(k_c,sign(concatenate(c,concatenate(k_c,eol)),inverse(k_c))))),
    inference(cnf_transformation,[],[f54]) ).

fof(f54,plain,
    ! [X0,X1,X2,X3,X4] :
      ( ( ~ knows(X1)
        | knows(symmetric_encrypt(secret,first(extract(decrypt(X4,inverse(k_c)),second(extract(X1,k_ca))))))
        | s != first(extract(X1,k_ca))
        | n != second(extract(decrypt(X4,inverse(k_c)),second(extract(X1,k_ca))))
        | ~ knows(X4) )
      & ( ~ knows(X2)
        | ~ knows(X0)
        | second(extract(X2,X3)) != X3
        | knows(concatenate(encrypt(sign(concatenate(kgen(X3),concatenate(X0,eol)),inverse(k_s)),X3),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
        | ~ knows(X3) )
      & knows(concatenate(n,concatenate(k_c,sign(concatenate(c,concatenate(k_c,eol)),inverse(k_c))))) ),
    inference(rectify,[],[f39]) ).

fof(f39,plain,
    ! [X1,X2,X0,X3,X4] :
      ( ( ~ knows(X2)
        | knows(symmetric_encrypt(secret,first(extract(decrypt(X4,inverse(k_c)),second(extract(X2,k_ca))))))
        | s != first(extract(X2,k_ca))
        | n != second(extract(decrypt(X4,inverse(k_c)),second(extract(X2,k_ca))))
        | ~ knows(X4) )
      & ( ~ knows(X0)
        | ~ knows(X1)
        | second(extract(X0,X3)) != X3
        | knows(concatenate(encrypt(sign(concatenate(kgen(X3),concatenate(X1,eol)),inverse(k_s)),X3),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
        | ~ knows(X3) )
      & knows(concatenate(n,concatenate(k_c,sign(concatenate(c,concatenate(k_c,eol)),inverse(k_c))))) ),
    inference(flattening,[],[f38]) ).

fof(f38,plain,
    ! [X2,X1,X4,X3,X0] :
      ( ( knows(concatenate(encrypt(sign(concatenate(kgen(X3),concatenate(X1,eol)),inverse(k_s)),X3),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
        | ~ knows(X1)
        | ~ knows(X0)
        | ~ knows(X3)
        | second(extract(X0,X3)) != X3 )
      & knows(concatenate(n,concatenate(k_c,sign(concatenate(c,concatenate(k_c,eol)),inverse(k_c)))))
      & ( knows(symmetric_encrypt(secret,first(extract(decrypt(X4,inverse(k_c)),second(extract(X2,k_ca))))))
        | ~ knows(X4)
        | n != second(extract(decrypt(X4,inverse(k_c)),second(extract(X2,k_ca))))
        | s != first(extract(X2,k_ca))
        | ~ knows(X2) ) ),
    inference(ennf_transformation,[],[f37]) ).

fof(f37,plain,
    ! [X2,X1,X4,X3,X0] :
      ( ( ( knows(X1)
          & knows(X0)
          & knows(X3)
          & second(extract(X0,X3)) = X3 )
       => knows(concatenate(encrypt(sign(concatenate(kgen(X3),concatenate(X1,eol)),inverse(k_s)),X3),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca)))) )
      & knows(concatenate(n,concatenate(k_c,sign(concatenate(c,concatenate(k_c,eol)),inverse(k_c)))))
      & ( ( knows(X4)
          & n = second(extract(decrypt(X4,inverse(k_c)),second(extract(X2,k_ca))))
          & s = first(extract(X2,k_ca))
          & knows(X2) )
       => knows(symmetric_encrypt(secret,first(extract(decrypt(X4,inverse(k_c)),second(extract(X2,k_ca)))))) ) ),
    inference(rectify,[],[f18]) ).

fof(f18,axiom,
    ! [X8,X6,X10,X7,X9] :
      ( ( ( knows(X10)
          & knows(X9)
          & first(extract(X10,k_ca)) = s
          & n = second(extract(decrypt(X9,inverse(k_c)),second(extract(X10,k_ca)))) )
       => knows(symmetric_encrypt(secret,first(extract(decrypt(X9,inverse(k_c)),second(extract(X10,k_ca)))))) )
      & ( ( knows(X8)
          & knows(X6)
          & second(extract(X8,X7)) = X7
          & knows(X7) )
       => knows(concatenate(encrypt(sign(concatenate(kgen(X7),concatenate(X6,eol)),inverse(k_s)),X7),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca)))) )
      & knows(concatenate(n,concatenate(k_c,sign(concatenate(c,concatenate(k_c,eol)),inverse(k_c))))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',protocol) ).

fof(f309,plain,
    ( ~ knows(n)
    | ~ spl0_14 ),
    inference(equality_resolution,[],[f288]) ).

fof(f288,plain,
    ( ! [X0] :
        ( n != X0
        | ~ knows(X0) )
    | ~ spl0_14 ),
    inference(avatar_component_clause,[],[f287]) ).

fof(f287,plain,
    ( spl0_14
  <=> ! [X0] :
        ( n != X0
        | ~ knows(X0) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_14])]) ).

fof(f300,plain,
    ( spl0_15
    | spl0_14
    | ~ spl0_4
    | ~ spl0_5 ),
    inference(avatar_split_clause,[],[f294,f149,f142,f287,f297]) ).

fof(f142,plain,
    ( spl0_4
  <=> ! [X0] :
        ( ~ knows(X0)
        | knows(concatenate(encrypt(sign(concatenate(kgen(k_a),concatenate(X0,eol)),inverse(k_s)),k_a),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca)))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_4])]) ).

fof(f149,plain,
    ( spl0_5
  <=> knows(sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_5])]) ).

fof(f294,plain,
    ( ! [X0] :
        ( ~ knows(X0)
        | n != X0
        | knows(symmetric_encrypt(secret,kgen(k_a))) )
    | ~ spl0_4
    | ~ spl0_5 ),
    inference(resolution,[],[f281,f261]) ).

fof(f261,plain,
    ( ! [X0] :
        ( knows(sign(concatenate(kgen(k_a),concatenate(X0,eol)),inverse(k_s)))
        | ~ knows(X0) )
    | ~ spl0_4 ),
    inference(resolution,[],[f259,f109]) ).

fof(f109,plain,
    ! [X0] :
      ( ~ knows(encrypt(X0,k_a))
      | knows(X0) ),
    inference(resolution,[],[f76,f71]) ).

fof(f71,plain,
    knows(inverse(k_a)),
    inference(cnf_transformation,[],[f17]) ).

fof(f17,axiom,
    ( knows(inverse(k_a))
    & knows(k_a)
    & knows(k_ca) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',previous_knowledge) ).

fof(f76,plain,
    ! [X0,X1] :
      ( ~ knows(inverse(X0))
      | knows(X1)
      | ~ knows(encrypt(X1,X0)) ),
    inference(cnf_transformation,[],[f55]) ).

fof(f55,plain,
    ! [X0,X1] :
      ( ~ knows(encrypt(X1,X0))
      | ~ knows(inverse(X0))
      | knows(X1) ),
    inference(rectify,[],[f48]) ).

fof(f48,plain,
    ! [X1,X0] :
      ( ~ knows(encrypt(X0,X1))
      | ~ knows(inverse(X1))
      | knows(X0) ),
    inference(flattening,[],[f47]) ).

fof(f47,plain,
    ! [X1,X0] :
      ( knows(X0)
      | ~ knows(inverse(X1))
      | ~ knows(encrypt(X0,X1)) ),
    inference(ennf_transformation,[],[f1]) ).

fof(f1,axiom,
    ! [X1,X0] :
      ( ( knows(inverse(X1))
        & knows(encrypt(X0,X1)) )
     => knows(X0) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',encrypt_equation) ).

fof(f259,plain,
    ( ! [X0] :
        ( knows(encrypt(sign(concatenate(kgen(k_a),concatenate(X0,eol)),inverse(k_s)),k_a))
        | ~ knows(X0) )
    | ~ spl0_4 ),
    inference(resolution,[],[f143,f80]) ).

fof(f143,plain,
    ( ! [X0] :
        ( knows(concatenate(encrypt(sign(concatenate(kgen(k_a),concatenate(X0,eol)),inverse(k_s)),k_a),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
        | ~ knows(X0) )
    | ~ spl0_4 ),
    inference(avatar_component_clause,[],[f142]) ).

fof(f281,plain,
    ( ! [X2,X3,X1] :
        ( ~ knows(sign(concatenate(X1,concatenate(X2,X3)),inverse(k_s)))
        | n != X2
        | knows(symmetric_encrypt(secret,X1)) )
    | ~ spl0_5 ),
    inference(subsumption_resolution,[],[f280,f116]) ).

fof(f116,plain,
    knows(k_c),
    inference(resolution,[],[f113,f80]) ).

fof(f113,plain,
    knows(concatenate(k_c,sign(concatenate(c,concatenate(k_c,eol)),inverse(k_c)))),
    inference(resolution,[],[f73,f79]) ).

fof(f79,plain,
    ! [X0,X1] :
      ( ~ knows(concatenate(X0,X1))
      | knows(X1) ),
    inference(cnf_transformation,[],[f58]) ).

fof(f280,plain,
    ( ! [X2,X3,X1] :
        ( ~ knows(k_c)
        | ~ knows(sign(concatenate(X1,concatenate(X2,X3)),inverse(k_s)))
        | n != X2
        | knows(symmetric_encrypt(secret,X1)) )
    | ~ spl0_5 ),
    inference(resolution,[],[f278,f61]) ).

fof(f61,plain,
    ! [X0,X1] :
      ( knows(encrypt(X0,X1))
      | ~ knows(X0)
      | ~ knows(X1) ),
    inference(cnf_transformation,[],[f52]) ).

fof(f52,plain,
    ! [X0,X1] :
      ( ~ knows(X0)
      | ~ knows(X1)
      | ( knows(sign(X0,X1))
        & knows(extract(X0,X1))
        & knows(symmetric_decrypt(X0,X1))
        & knows(concatenate(X0,X1))
        & knows(symmetric_encrypt(X0,X1))
        & knows(decrypt(X0,X1))
        & knows(encrypt(X0,X1)) ) ),
    inference(rectify,[],[f51]) ).

fof(f51,plain,
    ! [X1,X0] :
      ( ~ knows(X1)
      | ~ knows(X0)
      | ( knows(sign(X1,X0))
        & knows(extract(X1,X0))
        & knows(symmetric_decrypt(X1,X0))
        & knows(concatenate(X1,X0))
        & knows(symmetric_encrypt(X1,X0))
        & knows(decrypt(X1,X0))
        & knows(encrypt(X1,X0)) ) ),
    inference(flattening,[],[f50]) ).

fof(f50,plain,
    ! [X1,X0] :
      ( ( knows(sign(X1,X0))
        & knows(extract(X1,X0))
        & knows(symmetric_decrypt(X1,X0))
        & knows(concatenate(X1,X0))
        & knows(symmetric_encrypt(X1,X0))
        & knows(decrypt(X1,X0))
        & knows(encrypt(X1,X0)) )
      | ~ knows(X0)
      | ~ knows(X1) ),
    inference(ennf_transformation,[],[f25]) ).

fof(f25,plain,
    ! [X1,X0] :
      ( ( knows(X0)
        & knows(X1) )
     => ( knows(sign(X1,X0))
        & knows(extract(X1,X0))
        & knows(symmetric_decrypt(X1,X0))
        & knows(concatenate(X1,X0))
        & knows(symmetric_encrypt(X1,X0))
        & knows(decrypt(X1,X0))
        & knows(encrypt(X1,X0)) ) ),
    inference(rectify,[],[f4]) ).

fof(f4,axiom,
    ! [X1,X0] :
      ( ( knows(X0)
        & knows(X1) )
     => ( knows(extract(X0,X1))
        & knows(symmetric_decrypt(X0,X1))
        & knows(concatenate(X0,X1))
        & knows(encrypt(X0,X1))
        & knows(decrypt(X0,X1))
        & knows(sign(X0,X1))
        & knows(symmetric_encrypt(X0,X1)) ) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',construct_message_1) ).

fof(f278,plain,
    ( ! [X2,X0,X1] :
        ( ~ knows(encrypt(sign(concatenate(X2,concatenate(X0,X1)),inverse(k_s)),k_c))
        | knows(symmetric_encrypt(secret,X2))
        | n != X0 )
    | ~ spl0_5 ),
    inference(superposition,[],[f277,f98]) ).

fof(f98,plain,
    ! [X0,X1] : first(concatenate(X1,X0)) = X1,
    inference(definition_unfolding,[],[f77,f87]) ).

fof(f87,plain,
    ! [X0] : head(X0) = first(X0),
    inference(cnf_transformation,[],[f22]) ).

fof(f22,plain,
    ! [X0] : head(X0) = first(X0),
    inference(rectify,[],[f12]) ).

fof(f12,axiom,
    ! [X4] : first(X4) = head(X4),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',first_axiom) ).

fof(f77,plain,
    ! [X0,X1] : head(concatenate(X1,X0)) = X1,
    inference(cnf_transformation,[],[f56]) ).

fof(f56,plain,
    ! [X0,X1] : head(concatenate(X1,X0)) = X1,
    inference(rectify,[],[f23]) ).

fof(f23,plain,
    ! [X1,X0] : head(concatenate(X0,X1)) = X0,
    inference(rectify,[],[f10]) ).

fof(f10,axiom,
    ! [X4,X5] : head(concatenate(X4,X5)) = X4,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',head_axiom) ).

fof(f277,plain,
    ( ! [X0,X1] :
        ( n != first(X1)
        | knows(symmetric_encrypt(secret,X0))
        | ~ knows(encrypt(sign(concatenate(X0,X1),inverse(k_s)),k_c)) )
    | ~ spl0_5 ),
    inference(forward_demodulation,[],[f276,f98]) ).

fof(f276,plain,
    ( ! [X0,X1] :
        ( knows(symmetric_encrypt(secret,first(concatenate(X0,X1))))
        | n != first(X1)
        | ~ knows(encrypt(sign(concatenate(X0,X1),inverse(k_s)),k_c)) )
    | ~ spl0_5 ),
    inference(superposition,[],[f273,f85]) ).

fof(f85,plain,
    ! [X0,X1] : tail(concatenate(X0,X1)) = X1,
    inference(cnf_transformation,[],[f35]) ).

fof(f35,plain,
    ! [X0,X1] : tail(concatenate(X0,X1)) = X1,
    inference(rectify,[],[f11]) ).

fof(f11,axiom,
    ! [X4,X5] : tail(concatenate(X4,X5)) = X5,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',tail_axiom) ).

fof(f273,plain,
    ( ! [X0] :
        ( n != first(tail(X0))
        | ~ knows(encrypt(sign(X0,inverse(k_s)),k_c))
        | knows(symmetric_encrypt(secret,first(X0))) )
    | ~ spl0_5 ),
    inference(superposition,[],[f265,f81]) ).

fof(f81,plain,
    ! [X0,X1] : extract(sign(X1,inverse(X0)),X0) = X1,
    inference(cnf_transformation,[],[f59]) ).

fof(f59,plain,
    ! [X0,X1] : extract(sign(X1,inverse(X0)),X0) = X1,
    inference(rectify,[],[f28]) ).

fof(f28,plain,
    ! [X1,X0] : extract(sign(X0,inverse(X1)),X1) = X0,
    inference(rectify,[],[f9]) ).

fof(f9,axiom,
    ! [X2,X3] : extract(sign(X2,inverse(X3)),X3) = X2,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',sign_axiom) ).

fof(f265,plain,
    ( ! [X0] :
        ( n != first(tail(extract(X0,k_s)))
        | ~ knows(encrypt(X0,k_c))
        | knows(symmetric_encrypt(secret,first(extract(X0,k_s)))) )
    | ~ spl0_5 ),
    inference(superposition,[],[f178,f72]) ).

fof(f72,plain,
    ! [X0,X1] : decrypt(encrypt(X0,X1),inverse(X1)) = X0,
    inference(cnf_transformation,[],[f27]) ).

fof(f27,plain,
    ! [X0,X1] : decrypt(encrypt(X0,X1),inverse(X1)) = X0,
    inference(rectify,[],[f7]) ).

fof(f7,axiom,
    ! [X2,X3] : decrypt(encrypt(X2,X3),inverse(X3)) = X2,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',decrypt_axiom) ).

fof(f178,plain,
    ( ! [X0] :
        ( n != first(tail(extract(decrypt(X0,inverse(k_c)),k_s)))
        | knows(symmetric_encrypt(secret,first(extract(decrypt(X0,inverse(k_c)),k_s))))
        | ~ knows(X0) )
    | ~ spl0_5 ),
    inference(forward_demodulation,[],[f177,f98]) ).

fof(f177,plain,
    ( ! [X0] :
        ( n != first(tail(extract(decrypt(X0,inverse(k_c)),k_s)))
        | ~ knows(X0)
        | knows(symmetric_encrypt(secret,first(extract(decrypt(X0,inverse(k_c)),first(concatenate(k_s,eol)))))) )
    | ~ spl0_5 ),
    inference(forward_demodulation,[],[f176,f85]) ).

fof(f176,plain,
    ( ! [X0] :
        ( n != first(tail(extract(decrypt(X0,inverse(k_c)),k_s)))
        | knows(symmetric_encrypt(secret,first(extract(decrypt(X0,inverse(k_c)),first(tail(concatenate(s,concatenate(k_s,eol))))))))
        | ~ knows(X0) )
    | ~ spl0_5 ),
    inference(forward_demodulation,[],[f175,f98]) ).

fof(f175,plain,
    ( ! [X0] :
        ( n != first(tail(extract(decrypt(X0,inverse(k_c)),first(concatenate(k_s,eol)))))
        | ~ knows(X0)
        | knows(symmetric_encrypt(secret,first(extract(decrypt(X0,inverse(k_c)),first(tail(concatenate(s,concatenate(k_s,eol)))))))) )
    | ~ spl0_5 ),
    inference(forward_demodulation,[],[f174,f85]) ).

fof(f174,plain,
    ( ! [X0] :
        ( n != first(tail(extract(decrypt(X0,inverse(k_c)),first(tail(concatenate(s,concatenate(k_s,eol)))))))
        | knows(symmetric_encrypt(secret,first(extract(decrypt(X0,inverse(k_c)),first(tail(concatenate(s,concatenate(k_s,eol))))))))
        | ~ knows(X0) )
    | ~ spl0_5 ),
    inference(subsumption_resolution,[],[f159,f98]) ).

fof(f159,plain,
    ( ! [X0] :
        ( n != first(tail(extract(decrypt(X0,inverse(k_c)),first(tail(concatenate(s,concatenate(k_s,eol)))))))
        | s != first(concatenate(s,concatenate(k_s,eol)))
        | knows(symmetric_encrypt(secret,first(extract(decrypt(X0,inverse(k_c)),first(tail(concatenate(s,concatenate(k_s,eol))))))))
        | ~ knows(X0) )
    | ~ spl0_5 ),
    inference(resolution,[],[f151,f115]) ).

fof(f115,plain,
    ! [X0,X1] :
      ( ~ knows(sign(X0,inverse(k_ca)))
      | s != first(X0)
      | knows(symmetric_encrypt(secret,first(extract(decrypt(X1,inverse(k_c)),first(tail(X0))))))
      | n != first(tail(extract(decrypt(X1,inverse(k_c)),first(tail(X0)))))
      | ~ knows(X1) ),
    inference(superposition,[],[f96,f81]) ).

fof(f96,plain,
    ! [X1,X4] :
      ( s != first(extract(X1,k_ca))
      | ~ knows(X4)
      | ~ knows(X1)
      | knows(symmetric_encrypt(secret,first(extract(decrypt(X4,inverse(k_c)),first(tail(extract(X1,k_ca)))))))
      | n != first(tail(extract(decrypt(X4,inverse(k_c)),first(tail(extract(X1,k_ca)))))) ),
    inference(definition_unfolding,[],[f75,f94,f94,f94]) ).

fof(f94,plain,
    ! [X0] : second(X0) = first(tail(X0)),
    inference(definition_unfolding,[],[f89,f87]) ).

fof(f89,plain,
    ! [X0] : head(tail(X0)) = second(X0),
    inference(cnf_transformation,[],[f30]) ).

fof(f30,plain,
    ! [X0] : head(tail(X0)) = second(X0),
    inference(rectify,[],[f13]) ).

fof(f13,axiom,
    ! [X4] : second(X4) = head(tail(X4)),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',second_axiom) ).

fof(f75,plain,
    ! [X1,X4] :
      ( ~ knows(X1)
      | knows(symmetric_encrypt(secret,first(extract(decrypt(X4,inverse(k_c)),second(extract(X1,k_ca))))))
      | s != first(extract(X1,k_ca))
      | n != second(extract(decrypt(X4,inverse(k_c)),second(extract(X1,k_ca))))
      | ~ knows(X4) ),
    inference(cnf_transformation,[],[f54]) ).

fof(f151,plain,
    ( knows(sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca)))
    | ~ spl0_5 ),
    inference(avatar_component_clause,[],[f149]) ).

fof(f272,plain,
    ( spl0_12
    | spl0_6
    | ~ spl0_4
    | ~ spl0_5 ),
    inference(avatar_split_clause,[],[f266,f149,f142,f153,f269]) ).

fof(f153,plain,
    ( spl0_6
  <=> ! [X1] : ~ knows(X1) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_6])]) ).

fof(f266,plain,
    ( ! [X0] :
        ( ~ knows(X0)
        | knows(kgen(k_a)) )
    | ~ spl0_4
    | ~ spl0_5 ),
    inference(resolution,[],[f264,f80]) ).

fof(f264,plain,
    ( ! [X2] :
        ( knows(concatenate(kgen(k_a),concatenate(X2,eol)))
        | ~ knows(X2) )
    | ~ spl0_4
    | ~ spl0_5 ),
    inference(subsumption_resolution,[],[f263,f232]) ).

fof(f232,plain,
    ( knows(k_s)
    | ~ spl0_5 ),
    inference(resolution,[],[f180,f80]) ).

fof(f180,plain,
    ( knows(concatenate(k_s,eol))
    | ~ spl0_5 ),
    inference(resolution,[],[f162,f79]) ).

fof(f162,plain,
    ( knows(concatenate(s,concatenate(k_s,eol)))
    | ~ spl0_5 ),
    inference(subsumption_resolution,[],[f161,f69]) ).

fof(f69,plain,
    knows(k_ca),
    inference(cnf_transformation,[],[f17]) ).

fof(f161,plain,
    ( knows(concatenate(s,concatenate(k_s,eol)))
    | ~ knows(k_ca)
    | ~ spl0_5 ),
    inference(resolution,[],[f151,f83]) ).

fof(f83,plain,
    ! [X0,X1] :
      ( ~ knows(sign(X0,inverse(X1)))
      | ~ knows(X1)
      | knows(X0) ),
    inference(cnf_transformation,[],[f60]) ).

fof(f60,plain,
    ! [X0,X1] :
      ( ~ knows(sign(X0,inverse(X1)))
      | knows(X0)
      | ~ knows(X1) ),
    inference(rectify,[],[f41]) ).

fof(f41,plain,
    ! [X1,X0] :
      ( ~ knows(sign(X1,inverse(X0)))
      | knows(X1)
      | ~ knows(X0) ),
    inference(flattening,[],[f40]) ).

fof(f40,plain,
    ! [X1,X0] :
      ( knows(X1)
      | ~ knows(X0)
      | ~ knows(sign(X1,inverse(X0))) ),
    inference(ennf_transformation,[],[f33]) ).

fof(f33,plain,
    ! [X1,X0] :
      ( ( knows(X0)
        & knows(sign(X1,inverse(X0))) )
     => knows(X1) ),
    inference(rectify,[],[f3]) ).

fof(f3,axiom,
    ! [X3,X2] :
      ( ( knows(sign(X2,inverse(X3)))
        & knows(X3) )
     => knows(X2) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',sign_equation) ).

fof(f263,plain,
    ( ! [X2] :
        ( knows(concatenate(kgen(k_a),concatenate(X2,eol)))
        | ~ knows(X2)
        | ~ knows(k_s) )
    | ~ spl0_4 ),
    inference(resolution,[],[f261,f83]) ).

fof(f255,plain,
    ( spl0_6
    | ~ spl0_9 ),
    inference(avatar_split_clause,[],[f254,f186,f153]) ).

fof(f186,plain,
    ( spl0_9
  <=> ! [X0,X1] :
        ( k_a != X0
        | ~ knows(concatenate(X0,X1)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_9])]) ).

fof(f254,plain,
    ( ! [X0] : ~ knows(X0)
    | ~ spl0_9 ),
    inference(subsumption_resolution,[],[f253,f70]) ).

fof(f70,plain,
    knows(k_a),
    inference(cnf_transformation,[],[f17]) ).

fof(f253,plain,
    ( ! [X0] :
        ( ~ knows(X0)
        | ~ knows(k_a) )
    | ~ spl0_9 ),
    inference(resolution,[],[f251,f64]) ).

fof(f64,plain,
    ! [X0,X1] :
      ( knows(concatenate(X0,X1))
      | ~ knows(X1)
      | ~ knows(X0) ),
    inference(cnf_transformation,[],[f52]) ).

fof(f251,plain,
    ( ! [X0] : ~ knows(concatenate(k_a,X0))
    | ~ spl0_9 ),
    inference(equality_resolution,[],[f187]) ).

fof(f187,plain,
    ( ! [X0,X1] :
        ( k_a != X0
        | ~ knows(concatenate(X0,X1)) )
    | ~ spl0_9 ),
    inference(avatar_component_clause,[],[f186]) ).

fof(f231,plain,
    ~ spl0_6,
    inference(avatar_contradiction_clause,[],[f212]) ).

fof(f212,plain,
    ( $false
    | ~ spl0_6 ),
    inference(resolution,[],[f154,f112]) ).

fof(f154,plain,
    ( ! [X1] : ~ knows(X1)
    | ~ spl0_6 ),
    inference(avatar_component_clause,[],[f153]) ).

fof(f188,plain,
    ( spl0_9
    | spl0_6
    | ~ spl0_3 ),
    inference(avatar_split_clause,[],[f181,f139,f153,f186]) ).

fof(f139,plain,
    ( spl0_3
  <=> ! [X1] :
        ( ~ knows(X1)
        | k_a != first(tail(X1)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_3])]) ).

fof(f181,plain,
    ( ! [X2,X0,X1] :
        ( ~ knows(X2)
        | k_a != X0
        | ~ knows(concatenate(X0,X1)) )
    | ~ spl0_3 ),
    inference(resolution,[],[f158,f64]) ).

fof(f158,plain,
    ( ! [X2,X0,X1] :
        ( ~ knows(concatenate(X2,concatenate(X0,X1)))
        | k_a != X0 )
    | ~ spl0_3 ),
    inference(superposition,[],[f145,f98]) ).

fof(f145,plain,
    ( ! [X0,X1] :
        ( k_a != first(X1)
        | ~ knows(concatenate(X0,X1)) )
    | ~ spl0_3 ),
    inference(superposition,[],[f140,f85]) ).

fof(f140,plain,
    ( ! [X1] :
        ( k_a != first(tail(X1))
        | ~ knows(X1) )
    | ~ spl0_3 ),
    inference(avatar_component_clause,[],[f139]) ).

fof(f155,plain,
    ( spl0_5
    | spl0_6 ),
    inference(avatar_split_clause,[],[f147,f153,f149]) ).

fof(f147,plain,
    ! [X1] :
      ( ~ knows(X1)
      | knows(sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))) ),
    inference(resolution,[],[f124,f79]) ).

fof(f124,plain,
    ! [X0] :
      ( knows(concatenate(encrypt(sign(concatenate(kgen(k_c),concatenate(X0,eol)),inverse(k_s)),k_c),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
      | ~ knows(X0) ),
    inference(subsumption_resolution,[],[f123,f98]) ).

fof(f123,plain,
    ! [X0] :
      ( ~ knows(X0)
      | k_c != first(concatenate(k_c,eol))
      | knows(concatenate(encrypt(sign(concatenate(kgen(k_c),concatenate(X0,eol)),inverse(k_s)),k_c),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca)))) ),
    inference(forward_demodulation,[],[f122,f85]) ).

fof(f122,plain,
    ! [X0] :
      ( ~ knows(X0)
      | knows(concatenate(encrypt(sign(concatenate(kgen(k_c),concatenate(X0,eol)),inverse(k_s)),k_c),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
      | k_c != first(tail(concatenate(c,concatenate(k_c,eol)))) ),
    inference(subsumption_resolution,[],[f119,f116]) ).

fof(f119,plain,
    ! [X0] :
      ( k_c != first(tail(concatenate(c,concatenate(k_c,eol))))
      | ~ knows(X0)
      | knows(concatenate(encrypt(sign(concatenate(kgen(k_c),concatenate(X0,eol)),inverse(k_s)),k_c),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
      | ~ knows(k_c) ),
    inference(resolution,[],[f117,f114]) ).

fof(f114,plain,
    ! [X2,X0,X1] :
      ( ~ knows(sign(X0,inverse(X1)))
      | knows(concatenate(encrypt(sign(concatenate(kgen(X1),concatenate(X2,eol)),inverse(k_s)),X1),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
      | first(tail(X0)) != X1
      | ~ knows(X2)
      | ~ knows(X1) ),
    inference(superposition,[],[f97,f81]) ).

fof(f97,plain,
    ! [X2,X3,X0] :
      ( first(tail(extract(X2,X3))) != X3
      | ~ knows(X3)
      | knows(concatenate(encrypt(sign(concatenate(kgen(X3),concatenate(X0,eol)),inverse(k_s)),X3),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
      | ~ knows(X2)
      | ~ knows(X0) ),
    inference(definition_unfolding,[],[f74,f94]) ).

fof(f74,plain,
    ! [X2,X3,X0] :
      ( ~ knows(X2)
      | ~ knows(X0)
      | second(extract(X2,X3)) != X3
      | knows(concatenate(encrypt(sign(concatenate(kgen(X3),concatenate(X0,eol)),inverse(k_s)),X3),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
      | ~ knows(X3) ),
    inference(cnf_transformation,[],[f54]) ).

fof(f117,plain,
    knows(sign(concatenate(c,concatenate(k_c,eol)),inverse(k_c))),
    inference(resolution,[],[f113,f79]) ).

fof(f144,plain,
    ( spl0_3
    | spl0_4 ),
    inference(avatar_split_clause,[],[f137,f142,f139]) ).

fof(f137,plain,
    ! [X0,X1] :
      ( ~ knows(X0)
      | ~ knows(X1)
      | knows(concatenate(encrypt(sign(concatenate(kgen(k_a),concatenate(X0,eol)),inverse(k_s)),k_a),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
      | k_a != first(tail(X1)) ),
    inference(subsumption_resolution,[],[f136,f70]) ).

fof(f136,plain,
    ! [X0,X1] :
      ( k_a != first(tail(X1))
      | knows(concatenate(encrypt(sign(concatenate(kgen(k_a),concatenate(X0,eol)),inverse(k_s)),k_a),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
      | ~ knows(X0)
      | ~ knows(X1)
      | ~ knows(k_a) ),
    inference(resolution,[],[f118,f71]) ).

fof(f118,plain,
    ! [X2,X0,X1] :
      ( ~ knows(inverse(X0))
      | knows(concatenate(encrypt(sign(concatenate(kgen(X0),concatenate(X1,eol)),inverse(k_s)),X0),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
      | ~ knows(X2)
      | ~ knows(X1)
      | first(tail(X2)) != X0
      | ~ knows(X0) ),
    inference(resolution,[],[f114,f67]) ).

fof(f67,plain,
    ! [X0,X1] :
      ( knows(sign(X0,X1))
      | ~ knows(X0)
      | ~ knows(X1) ),
    inference(cnf_transformation,[],[f52]) ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.03/0.12  % Problem    : SWV233+1 : TPTP v8.1.0. Released v3.2.0.
% 0.03/0.13  % Command    : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s
% 0.13/0.35  % Computer : n002.cluster.edu
% 0.13/0.35  % Model    : x86_64 x86_64
% 0.13/0.35  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.35  % Memory   : 8042.1875MB
% 0.13/0.35  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.13/0.35  % CPULimit   : 300
% 0.13/0.35  % WCLimit    : 300
% 0.13/0.35  % DateTime   : Tue Aug 30 19:20:14 EDT 2022
% 0.13/0.35  % CPUTime    : 
% 0.21/0.49  % (21885)dis+1002_1:12_drc=off:fd=preordered:tgt=full:i=99978:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99978Mi)
% 0.21/0.49  % (21898)lrs+10_1:4_av=off:bs=unit_only:bsr=unit_only:ep=RS:s2a=on:sos=on:sp=frequency:to=lpo:i=16:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/16Mi)
% 0.21/0.50  % (21906)dis+1010_1:1_bs=on:ep=RS:erd=off:newcnf=on:nwc=10.0:s2a=on:sgt=32:ss=axioms:i=30:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/30Mi)
% 0.21/0.50  % (21894)dis+10_1:1_newcnf=on:sgt=8:sos=on:ss=axioms:to=lpo:urr=on:i=49:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/49Mi)
% 0.21/0.50  % (21906)Refutation not found, incomplete strategy% (21906)------------------------------
% 0.21/0.50  % (21906)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.50  % (21898)Refutation not found, incomplete strategy% (21898)------------------------------
% 0.21/0.50  % (21898)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.50  % (21906)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.50  % (21906)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.50  
% 0.21/0.50  % (21906)Memory used [KB]: 6012
% 0.21/0.50  % (21906)Time elapsed: 0.090 s
% 0.21/0.50  % (21906)Instructions burned: 4 (million)
% 0.21/0.50  % (21906)------------------------------
% 0.21/0.50  % (21906)------------------------------
% 0.21/0.50  % (21898)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.50  % (21898)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.50  
% 0.21/0.50  % (21898)Memory used [KB]: 1535
% 0.21/0.50  % (21898)Time elapsed: 0.097 s
% 0.21/0.50  % (21898)Instructions burned: 3 (million)
% 0.21/0.50  % (21898)------------------------------
% 0.21/0.50  % (21898)------------------------------
% 0.21/0.51  % (21903)fmb+10_1:1_nm=2:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 0.21/0.51  % (21914)dis+2_3:1_aac=none:abs=on:ep=R:lcm=reverse:nwc=10.0:sos=on:sp=const_frequency:spb=units:urr=ec_only:i=8:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/8Mi)
% 0.21/0.51  % (21891)dis+21_1:1_av=off:sos=on:sp=frequency:ss=included:to=lpo:i=15:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/15Mi)
% 0.21/0.51  % (21914)Refutation not found, incomplete strategy% (21914)------------------------------
% 0.21/0.51  % (21914)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.51  % (21914)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.51  % (21914)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.51  
% 0.21/0.51  % (21914)Memory used [KB]: 6012
% 0.21/0.51  % (21914)Time elapsed: 0.098 s
% 0.21/0.51  % (21914)Instructions burned: 2 (million)
% 0.21/0.51  % (21914)------------------------------
% 0.21/0.51  % (21914)------------------------------
% 0.21/0.51  % (21890)lrs+10_1:1024_nm=0:nwc=5.0:ss=axioms:i=13:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/13Mi)
% 0.21/0.51  % (21890)Refutation not found, incomplete strategy% (21890)------------------------------
% 0.21/0.51  % (21890)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.51  % (21890)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.51  % (21890)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.51  
% 0.21/0.51  % (21890)Memory used [KB]: 5884
% 0.21/0.51  % (21890)Time elapsed: 0.002 s
% 0.21/0.51  % (21890)------------------------------
% 0.21/0.51  % (21890)------------------------------
% 0.21/0.51  % (21911)lrs+11_1:1_plsq=on:plsqc=1:plsqr=32,1:ss=included:i=95:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/95Mi)
% 0.21/0.51  % (21887)lrs+10_1:1_gsp=on:sd=1:sgt=32:sos=on:ss=axioms:i=13:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/13Mi)
% 0.21/0.51  % (21887)Refutation not found, incomplete strategy% (21887)------------------------------
% 0.21/0.51  % (21887)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.51  % (21887)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.51  % (21887)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.51  
% 0.21/0.51  % (21887)Memory used [KB]: 6012
% 0.21/0.51  % (21887)Time elapsed: 0.104 s
% 0.21/0.51  % (21887)Instructions burned: 3 (million)
% 0.21/0.51  % (21887)------------------------------
% 0.21/0.51  % (21887)------------------------------
% 0.21/0.51  % (21893)lrs+2_1:1_lcm=reverse:lma=on:sos=all:spb=goal_then_units:ss=included:urr=on:i=39:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/39Mi)
% 0.21/0.52  % (21888)dis+1002_1:1_aac=none:bd=off:sac=on:sos=on:spb=units:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 0.21/0.52  % (21910)dis+21_1:1_ep=RS:nwc=10.0:s2a=on:s2at=1.5:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 0.21/0.52  % (21908)dis+1010_2:3_fs=off:fsr=off:nm=0:nwc=5.0:s2a=on:s2agt=32:i=82:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/82Mi)
% 0.21/0.52  % (21895)lrs+10_1:1_br=off:sos=on:ss=axioms:st=2.0:urr=on:i=33:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/33Mi)
% 0.21/0.53  % (21891)Refutation not found, incomplete strategy% (21891)------------------------------
% 0.21/0.53  % (21891)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.53  % (21891)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.53  % (21891)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.53  
% 0.21/0.53  % (21891)Memory used [KB]: 1535
% 0.21/0.53  % (21891)Time elapsed: 0.118 s
% 0.21/0.53  % (21891)Instructions burned: 3 (million)
% 0.21/0.53  % (21891)------------------------------
% 0.21/0.53  % (21891)------------------------------
% 0.21/0.53  % (21912)lrs+1011_1:1_fd=preordered:fsd=on:sos=on:thsq=on:thsqc=64:thsqd=32:uwa=ground:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 0.21/0.53  % (21900)lrs+10_1:1_ins=3:sp=reverse_frequency:spb=goal:to=lpo:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 0.21/0.53  % (21915)lrs-11_1:1_nm=0:sac=on:sd=4:ss=axioms:st=3.0:i=24:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/24Mi)
% 0.21/0.53  % (21900)Instruction limit reached!
% 0.21/0.53  % (21900)------------------------------
% 0.21/0.53  % (21900)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.53  % (21900)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.53  % (21900)Termination reason: Unknown
% 0.21/0.53  % (21900)Termination phase: Saturation
% 0.21/0.53  
% 0.21/0.53  % (21900)Memory used [KB]: 6012
% 0.21/0.53  % (21900)Time elapsed: 0.097 s
% 0.21/0.53  % (21900)Instructions burned: 3 (million)
% 0.21/0.53  % (21900)------------------------------
% 0.21/0.53  % (21900)------------------------------
% 0.21/0.53  % (21889)lrs+10_5:1_br=off:fde=none:nwc=3.0:sd=1:sgt=10:sos=on:ss=axioms:urr=on:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.21/0.53  % (21913)dis+21_1:1_aac=none:abs=on:er=known:fde=none:fsr=off:nwc=5.0:s2a=on:s2at=4.0:sp=const_frequency:to=lpo:urr=ec_only:i=25:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/25Mi)
% 1.44/0.53  % (21911)First to succeed.
% 1.44/0.53  % (21903)Instruction limit reached!
% 1.44/0.53  % (21903)------------------------------
% 1.44/0.53  % (21903)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.53  % (21903)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.44/0.53  % (21903)Termination reason: Unknown
% 1.44/0.53  % (21903)Termination phase: Finite model building preprocessing
% 1.44/0.53  
% 1.44/0.53  % (21903)Memory used [KB]: 1535
% 1.44/0.53  % (21903)Time elapsed: 0.004 s
% 1.44/0.53  % (21903)Instructions burned: 3 (million)
% 1.44/0.53  % (21903)------------------------------
% 1.44/0.53  % (21903)------------------------------
% 1.44/0.54  % (21896)lrs+10_1:1_ep=R:lcm=predicate:lma=on:sos=all:spb=goal:ss=included:i=12:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/12Mi)
% 1.44/0.54  % (21907)ott+21_1:1_erd=off:s2a=on:sac=on:sd=1:sgt=64:sos=on:ss=included:st=3.0:to=lpo:urr=on:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 1.44/0.54  % (21902)lrs+1011_1:1_fd=preordered:fsd=on:sos=on:thsq=on:thsqc=64:thsqd=32:uwa=ground:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 1.44/0.54  % (21896)Refutation not found, incomplete strategy% (21896)------------------------------
% 1.44/0.54  % (21896)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.54  % (21896)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.44/0.54  % (21896)Termination reason: Refutation not found, incomplete strategy
% 1.44/0.54  
% 1.44/0.54  % (21896)Memory used [KB]: 5884
% 1.44/0.54  % (21896)Time elapsed: 0.129 s
% 1.44/0.54  % (21896)Instructions burned: 2 (million)
% 1.44/0.54  % (21896)------------------------------
% 1.44/0.54  % (21896)------------------------------
% 1.44/0.54  % (21905)dis-10_3:2_amm=sco:ep=RS:fsr=off:nm=10:sd=2:sos=on:ss=axioms:st=3.0:i=11:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/11Mi)
% 1.44/0.54  % (21888)Instruction limit reached!
% 1.44/0.54  % (21888)------------------------------
% 1.44/0.54  % (21888)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.54  % (21888)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.44/0.54  % (21888)Termination reason: Unknown
% 1.44/0.54  % (21888)Termination phase: Saturation
% 1.44/0.54  
% 1.44/0.54  % (21888)Memory used [KB]: 6012
% 1.44/0.54  % (21888)Time elapsed: 0.003 s
% 1.44/0.54  % (21888)Instructions burned: 3 (million)
% 1.44/0.54  % (21888)------------------------------
% 1.44/0.54  % (21888)------------------------------
% 1.44/0.54  % (21905)Refutation not found, incomplete strategy% (21905)------------------------------
% 1.44/0.54  % (21905)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.54  % (21904)ott+1010_1:1_sd=2:sos=on:sp=occurrence:ss=axioms:urr=on:i=2:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/2Mi)
% 1.44/0.54  % (21904)Refutation not found, incomplete strategy% (21904)------------------------------
% 1.44/0.54  % (21904)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.54  % (21904)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.44/0.54  % (21904)Termination reason: Refutation not found, incomplete strategy
% 1.44/0.54  
% 1.44/0.54  % (21897)lrs+10_1:2_br=off:nm=4:ss=included:urr=on:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 1.44/0.54  % (21904)Memory used [KB]: 5884
% 1.44/0.54  % (21904)Time elapsed: 0.002 s
% 1.44/0.54  % (21904)------------------------------
% 1.44/0.54  % (21904)------------------------------
% 1.44/0.54  % (21905)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.44/0.54  % (21905)Termination reason: Refutation not found, incomplete strategy
% 1.44/0.54  
% 1.44/0.54  % (21905)Memory used [KB]: 5884
% 1.44/0.54  % (21905)Time elapsed: 0.131 s
% 1.44/0.54  % (21905)Instructions burned: 3 (million)
% 1.44/0.54  % (21905)------------------------------
% 1.44/0.54  % (21905)------------------------------
% 1.44/0.54  % (21899)lrs+10_1:32_br=off:nm=16:sd=2:ss=axioms:st=2.0:urr=on:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 1.44/0.54  % (21910)Refutation not found, incomplete strategy% (21910)------------------------------
% 1.44/0.54  % (21910)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.54  % (21897)Instruction limit reached!
% 1.44/0.54  % (21897)------------------------------
% 1.44/0.54  % (21897)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.54  % (21909)dis+10_1:1_av=off:sos=on:sp=reverse_arity:ss=included:st=2.0:to=lpo:urr=ec_only:i=45:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/45Mi)
% 1.44/0.54  % (21909)Refutation not found, incomplete strategy% (21909)------------------------------
% 1.44/0.54  % (21909)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.55  % (21901)lrs+10_1:1_drc=off:sp=reverse_frequency:spb=goal:to=lpo:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 1.44/0.55  % (21892)dis+1010_1:50_awrs=decay:awrsf=128:nwc=10.0:s2pl=no:sp=frequency:ss=axioms:i=39:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/39Mi)
% 1.44/0.55  % (21892)Refutation not found, incomplete strategy% (21892)------------------------------
% 1.44/0.55  % (21892)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.55  % (21892)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.44/0.55  % (21892)Termination reason: Refutation not found, incomplete strategy
% 1.44/0.55  
% 1.44/0.55  % (21892)Memory used [KB]: 5884
% 1.44/0.55  % (21892)Time elapsed: 0.001 s
% 1.44/0.55  % (21892)------------------------------
% 1.44/0.55  % (21892)------------------------------
% 1.44/0.55  % (21901)Instruction limit reached!
% 1.44/0.55  % (21901)------------------------------
% 1.44/0.55  % (21901)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.55  % (21910)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.44/0.55  % (21910)Termination reason: Refutation not found, incomplete strategy
% 1.44/0.55  
% 1.44/0.55  % (21910)Memory used [KB]: 6012
% 1.44/0.55  % (21910)Time elapsed: 0.140 s
% 1.44/0.55  % (21910)Instructions burned: 3 (million)
% 1.44/0.55  % (21910)------------------------------
% 1.44/0.55  % (21910)------------------------------
% 1.44/0.55  % (21897)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.44/0.55  % (21897)Termination reason: Unknown
% 1.44/0.55  % (21897)Termination phase: Saturation
% 1.44/0.55  
% 1.44/0.55  % (21897)Memory used [KB]: 6140
% 1.44/0.55  % (21897)Time elapsed: 0.144 s
% 1.44/0.55  % (21897)Instructions burned: 8 (million)
% 1.44/0.55  % (21897)------------------------------
% 1.44/0.55  % (21897)------------------------------
% 1.59/0.55  % (21911)Refutation found. Thanks to Tanya!
% 1.59/0.55  % SZS status Theorem for theBenchmark
% 1.59/0.55  % SZS output start Proof for theBenchmark
% See solution above
% 1.59/0.55  % (21911)------------------------------
% 1.59/0.55  % (21911)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.59/0.55  % (21911)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.59/0.55  % (21911)Termination reason: Refutation
% 1.59/0.55  
% 1.59/0.55  % (21911)Memory used [KB]: 6140
% 1.59/0.55  % (21911)Time elapsed: 0.125 s
% 1.59/0.55  % (21911)Instructions burned: 11 (million)
% 1.59/0.55  % (21911)------------------------------
% 1.59/0.55  % (21911)------------------------------
% 1.59/0.55  % (21884)Success in time 0.189 s
%------------------------------------------------------------------------------