TSTP Solution File: SWW964+1 by SnakeForV---1.0

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : SnakeForV---1.0
% Problem  : SWW964+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s

% Computer : n010.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Wed Aug 31 19:15:09 EDT 2022

% Result   : Theorem 2.16s 0.67s
% Output   : Refutation 2.16s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :   14
%            Number of leaves      :   63
% Syntax   : Number of formulae    :  285 (  64 unt;   0 def)
%            Number of atoms       :  736 (  65 equ)
%            Maximal formula atoms :    7 (   2 avg)
%            Number of connectives :  820 ( 369   ~; 340   |;  44   &)
%                                         (  18 <=>;  49  =>;   0  <=;   0 <~>)
%            Maximal formula depth :   12 (   5 avg)
%            Maximal term depth    :    7 (   2 avg)
%            Number of predicates  :   23 (  21 usr;  19 prp; 0-2 aty)
%            Number of functors    :   47 (  47 usr;  14 con; 0-4 aty)
%            Number of variables   :  447 ( 445   !;   2   ?)

% Comments : 
%------------------------------------------------------------------------------
fof(f1663,plain,
    $false,
    inference(avatar_sat_refutation,[],[f667,f722,f812,f890,f892,f1039,f1280,f1313,f1318,f1432,f1438,f1455,f1492,f1506,f1580,f1583,f1644,f1660,f1662]) ).

fof(f1662,plain,
    ( spl3_5
    | ~ spl3_39
    | ~ spl3_50 ),
    inference(avatar_split_clause,[],[f1653,f1641,f1453,f715]) ).

fof(f715,plain,
    ( spl3_5
  <=> pred_attacker(sF1) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_5])]) ).

fof(f1453,plain,
    ( spl3_39
  <=> ! [X7] :
        ( ~ pred_attacker(constr_ecb_enc_1(X7,constr_pkey(name_skA)))
        | pred_attacker(X7) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_39])]) ).

fof(f1641,plain,
    ( spl3_50
  <=> pred_attacker(constr_ecb_enc_1(sF1,constr_pkey(name_skA))) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_50])]) ).

fof(f1653,plain,
    ( pred_attacker(sF1)
    | ~ spl3_39
    | ~ spl3_50 ),
    inference(resolution,[],[f1643,f1454]) ).

fof(f1454,plain,
    ( ! [X7] :
        ( ~ pred_attacker(constr_ecb_enc_1(X7,constr_pkey(name_skA)))
        | pred_attacker(X7) )
    | ~ spl3_39 ),
    inference(avatar_component_clause,[],[f1453]) ).

fof(f1643,plain,
    ( pred_attacker(constr_ecb_enc_1(sF1,constr_pkey(name_skA)))
    | ~ spl3_50 ),
    inference(avatar_component_clause,[],[f1641]) ).

fof(f1660,plain,
    ( spl3_46
    | ~ spl3_1 ),
    inference(avatar_split_clause,[],[f1659,f655,f1574]) ).

fof(f1574,plain,
    ( spl3_46
  <=> ! [X4] : ~ pred_attacker(tuple_client_B_in_3(X4)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_46])]) ).

fof(f655,plain,
    ( spl3_1
  <=> ! [X0] :
        ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB)))
        | ~ pred_attacker(tuple_client_B_in_3(X0)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_1])]) ).

fof(f1659,plain,
    ( ! [X0] : ~ pred_attacker(tuple_client_B_in_3(X0))
    | ~ spl3_1 ),
    inference(subsumption_resolution,[],[f656,f533]) ).

fof(f533,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X1,X0),
    inference(cnf_transformation,[],[f423]) ).

fof(f423,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X1,X0),
    inference(rectify,[],[f276]) ).

fof(f276,plain,
    ! [X1,X0] : pred_eq_bitstring_bitstring(X0,X1),
    inference(rectify,[],[f96]) ).

fof(f96,axiom,
    ! [X49,X50] : pred_eq_bitstring_bitstring(X49,X50),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax95) ).

fof(f656,plain,
    ( ! [X0] :
        ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB)))
        | ~ pred_attacker(tuple_client_B_in_3(X0)) )
    | ~ spl3_1 ),
    inference(avatar_component_clause,[],[f655]) ).

fof(f1644,plain,
    ( spl3_13
    | spl3_50
    | ~ spl3_47 ),
    inference(avatar_split_clause,[],[f1638,f1578,f1641,f938]) ).

fof(f938,plain,
    ( spl3_13
  <=> ! [X1] : ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,name_A)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_13])]) ).

fof(f1578,plain,
    ( spl3_47
  <=> ! [X2,X0] :
        ( ~ pred_attacker(tuple_client_B_in_2(X0))
        | pred_attacker(constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_47])]) ).

fof(f1638,plain,
    ( ! [X1] :
        ( pred_attacker(constr_ecb_enc_1(sF1,constr_pkey(name_skA)))
        | ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,name_A)) )
    | ~ spl3_47 ),
    inference(resolution,[],[f1609,f573]) ).

fof(f573,plain,
    pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
    inference(cnf_transformation,[],[f183]) ).

fof(f183,axiom,
    pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax182) ).

fof(f1609,plain,
    ( ! [X2,X0,X1] :
        ( ~ pred_table(tuple_keys(X1,X0))
        | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X1))
        | pred_attacker(constr_ecb_enc_1(sF1,X0)) )
    | ~ spl3_47 ),
    inference(resolution,[],[f1607,f903]) ).

fof(f903,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(constr_sign(tuple_2(X1,X2),name_skS))
      | ~ pred_table(tuple_keys(X1,X2))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
    inference(resolution,[],[f538,f584]) ).

fof(f584,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f358]) ).

fof(f358,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
    inference(ennf_transformation,[],[f227]) ).

fof(f227,plain,
    ! [X0] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f114]) ).

fof(f114,axiom,
    ! [X68] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X68))
     => pred_attacker(X68) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax113) ).

fof(f538,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X2),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
      | ~ pred_table(tuple_keys(X0,X2)) ),
    inference(cnf_transformation,[],[f425]) ).

fof(f425,plain,
    ! [X0,X1,X2] :
      ( ~ pred_table(tuple_keys(X0,X2))
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X2),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) ),
    inference(rectify,[],[f325]) ).

fof(f325,plain,
    ! [X2,X0,X1] :
      ( ~ pred_table(tuple_keys(X2,X1))
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X2,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X2)) ),
    inference(flattening,[],[f324]) ).

fof(f324,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X2,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X2))
      | ~ pred_table(tuple_keys(X2,X1)) ),
    inference(ennf_transformation,[],[f237]) ).

fof(f237,plain,
    ! [X2,X0,X1] :
      ( ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X2))
        & pred_table(tuple_keys(X2,X1)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X2,X1),name_skS))) ),
    inference(rectify,[],[f194]) ).

fof(f194,axiom,
    ! [X198,X197,X196] :
      ( ( pred_attacker(tuple_key_retrieval_server_in_1(X198,X196))
        & pred_table(tuple_keys(X196,X197)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X196,X197),name_skS))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax193) ).

fof(f1607,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(constr_sign(tuple_2(X1,X0),name_skS))
        | pred_attacker(constr_ecb_enc_1(sF1,X0)) )
    | ~ spl3_47 ),
    inference(resolution,[],[f1602,f539]) ).

fof(f539,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f299]) ).

fof(f299,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f208]) ).

fof(f208,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_2(X0)) ),
    inference(rectify,[],[f144]) ).

fof(f144,axiom,
    ! [X122] :
      ( pred_attacker(X122)
     => pred_attacker(tuple_client_B_in_2(X122)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax143) ).

fof(f1602,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(tuple_client_B_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
        | pred_attacker(constr_ecb_enc_1(sF1,X1)) )
    | ~ spl3_47 ),
    inference(superposition,[],[f1598,f589]) ).

fof(f589,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X1,X0)) = X0,
    inference(cnf_transformation,[],[f272]) ).

fof(f272,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X1,X0)) = X0,
    inference(rectify,[],[f90]) ).

fof(f90,axiom,
    ! [X36,X35] : constr_tuple_2_get_1_bitstring(tuple_2(X35,X36)) = X36,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax89) ).

fof(f1598,plain,
    ( ! [X0] :
        ( pred_attacker(constr_ecb_enc_1(sF1,constr_tuple_2_get_1_bitstring(X0)))
        | ~ pred_attacker(tuple_client_B_in_2(constr_sign(X0,name_skS))) )
    | ~ spl3_47 ),
    inference(superposition,[],[f1596,f502]) ).

fof(f502,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X0,X1),constr_pkey(X1)) = X0,
    inference(cnf_transformation,[],[f415]) ).

fof(f415,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X0,X1),constr_pkey(X1)) = X0,
    inference(rectify,[],[f230]) ).

fof(f230,plain,
    ! [X1,X0] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
    inference(rectify,[],[f81]) ).

fof(f81,axiom,
    ! [X4,X5] : constr_checksign(constr_sign(X5,X4),constr_pkey(X4)) = X5,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax80) ).

fof(f1596,plain,
    ( ! [X0] :
        ( pred_attacker(constr_ecb_enc_1(sF1,constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))
        | ~ pred_attacker(tuple_client_B_in_2(X0)) )
    | ~ spl3_47 ),
    inference(superposition,[],[f1579,f651]) ).

fof(f651,plain,
    sF1 = name_Nb(sK0),
    introduced(function_definition,[]) ).

fof(f1579,plain,
    ( ! [X2,X0] :
        ( pred_attacker(constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))
        | ~ pred_attacker(tuple_client_B_in_2(X0)) )
    | ~ spl3_47 ),
    inference(avatar_component_clause,[],[f1578]) ).

fof(f1583,plain,
    ( spl3_33
    | ~ spl3_46 ),
    inference(avatar_split_clause,[],[f1582,f1574,f1275]) ).

fof(f1275,plain,
    ( spl3_33
  <=> ! [X2] : ~ pred_attacker(X2) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_33])]) ).

fof(f1582,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl3_46 ),
    inference(resolution,[],[f1575,f547]) ).

fof(f547,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f402]) ).

fof(f402,plain,
    ! [X0] :
      ( ~ pred_attacker(X0)
      | pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(ennf_transformation,[],[f270]) ).

fof(f270,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(rectify,[],[f142]) ).

fof(f142,axiom,
    ! [X120] :
      ( pred_attacker(X120)
     => pred_attacker(tuple_client_B_in_3(X120)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax141) ).

fof(f1575,plain,
    ( ! [X4] : ~ pred_attacker(tuple_client_B_in_3(X4))
    | ~ spl3_46 ),
    inference(avatar_component_clause,[],[f1574]) ).

fof(f1580,plain,
    ( spl3_46
    | spl3_47 ),
    inference(avatar_split_clause,[],[f1564,f1578,f1574]) ).

fof(f1564,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_client_B_in_2(X0))
      | pred_attacker(constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))
      | ~ pred_attacker(tuple_client_B_in_3(X1)) ),
    inference(resolution,[],[f1541,f626]) ).

fof(f626,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_3(X1,X2,X0))
      | pred_attacker(X2) ),
    inference(cnf_transformation,[],[f442]) ).

fof(f442,plain,
    ! [X0,X1,X2] :
      ( ~ pred_attacker(tuple_3(X1,X2,X0))
      | pred_attacker(X2) ),
    inference(rectify,[],[f405]) ).

fof(f405,plain,
    ! [X1,X2,X0] :
      ( ~ pred_attacker(tuple_3(X2,X0,X1))
      | pred_attacker(X0) ),
    inference(ennf_transformation,[],[f210]) ).

fof(f210,plain,
    ! [X1,X0,X2] :
      ( pred_attacker(tuple_3(X2,X0,X1))
     => pred_attacker(X0) ),
    inference(rectify,[],[f170]) ).

fof(f170,axiom,
    ! [X167,X168,X166] :
      ( pred_attacker(tuple_3(X166,X167,X168))
     => pred_attacker(X167) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax169) ).

fof(f1541,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X1))
      | ~ pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(resolution,[],[f1520,f501]) ).

fof(f501,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_B_out_4(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f386]) ).

fof(f386,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_4(X0)) ),
    inference(ennf_transformation,[],[f238]) ).

fof(f238,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_4(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f136]) ).

fof(f136,axiom,
    ! [X111] :
      ( pred_attacker(tuple_client_B_out_4(X111))
     => pred_attacker(X111) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax135) ).

fof(f1520,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_attacker(tuple_client_B_in_2(X2)) ),
    inference(subsumption_resolution,[],[f1519,f533]) ).

fof(f1519,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1)) ),
    inference(subsumption_resolution,[],[f644,f533]) ).

fof(f644,plain,
    ! [X2,X0,X1] :
      ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))) ),
    inference(definition_unfolding,[],[f468,f555]) ).

fof(f555,plain,
    ! [X2,X3,X0,X1] : constr_ecb_enc_3(X1,X2,X0,X3) = tuple_3(constr_ecb_enc_1(X1,X3),constr_ecb_enc_1(X2,X3),constr_ecb_enc_1(X0,X3)),
    inference(cnf_transformation,[],[f429]) ).

fof(f429,plain,
    ! [X0,X1,X2,X3] : constr_ecb_enc_3(X1,X2,X0,X3) = tuple_3(constr_ecb_enc_1(X1,X3),constr_ecb_enc_1(X2,X3),constr_ecb_enc_1(X0,X3)),
    inference(rectify,[],[f246]) ).

fof(f246,plain,
    ! [X0,X3,X2,X1] : constr_ecb_enc_3(X3,X2,X0,X1) = tuple_3(constr_ecb_enc_1(X3,X1),constr_ecb_enc_1(X2,X1),constr_ecb_enc_1(X0,X1)),
    inference(rectify,[],[f87]) ).

fof(f87,axiom,
    ! [X28,X25,X27,X26] : constr_ecb_enc_3(X26,X27,X28,X25) = tuple_3(constr_ecb_enc_1(X26,X25),constr_ecb_enc_1(X27,X25),constr_ecb_enc_1(X28,X25)),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax86) ).

fof(f468,plain,
    ! [X2,X0,X1] :
      ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
      | pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS)))) ),
    inference(cnf_transformation,[],[f408]) ).

fof(f408,plain,
    ! [X0,X1,X2] :
      ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
      | pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS)))) ),
    inference(rectify,[],[f377]) ).

fof(f377,plain,
    ! [X2,X1,X0] :
      ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
      | pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X2),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS)))) ),
    inference(flattening,[],[f376]) ).

fof(f376,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X2),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
    inference(ennf_transformation,[],[f294]) ).

fof(f294,plain,
    ! [X2,X0,X1] :
      ( ( pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_2(X0))
        & pred_attacker(tuple_client_B_in_3(X1))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) )
     => pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X2),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
    inference(rectify,[],[f192]) ).

fof(f192,axiom,
    ! [X191,X190,X189] :
      ( ( pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X190,name_skB)))
        & pred_attacker(tuple_client_B_in_3(X190))
        & pred_attacker(tuple_client_B_in_2(X191))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X191,constr_pkey(name_skS)))) )
     => pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X190,name_skB)),name_Nb(X189),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X191,constr_pkey(name_skS)))))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax191) ).

fof(f1506,plain,
    ( spl3_33
    | ~ spl3_38 ),
    inference(avatar_split_clause,[],[f1505,f1450,f1275]) ).

fof(f1450,plain,
    ( spl3_38
  <=> ! [X8] : ~ pred_attacker(constr_ecb_enc_1(X8,constr_pkey(name_skA))) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_38])]) ).

fof(f1505,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl3_38 ),
    inference(subsumption_resolution,[],[f1493,f673]) ).

fof(f673,plain,
    pred_attacker(constr_pkey(name_skA)),
    inference(resolution,[],[f565,f474]) ).

fof(f474,plain,
    pred_attacker(tuple_out_1(constr_pkey(name_skA))),
    inference(cnf_transformation,[],[f185]) ).

fof(f185,axiom,
    pred_attacker(tuple_out_1(constr_pkey(name_skA))),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax184) ).

fof(f565,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_out_1(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f371]) ).

fof(f371,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_out_1(X0))
      | pred_attacker(X0) ),
    inference(ennf_transformation,[],[f290]) ).

fof(f290,plain,
    ! [X0] :
      ( pred_attacker(tuple_out_1(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f112]) ).

fof(f112,axiom,
    ! [X66] :
      ( pred_attacker(tuple_out_1(X66))
     => pred_attacker(X66) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax111) ).

fof(f1493,plain,
    ( ! [X0] :
        ( ~ pred_attacker(constr_pkey(name_skA))
        | ~ pred_attacker(X0) )
    | ~ spl3_38 ),
    inference(resolution,[],[f1451,f458]) ).

fof(f458,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_ecb_enc_1(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(cnf_transformation,[],[f317]) ).

fof(f317,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(X0)
      | ~ pred_attacker(X1)
      | pred_attacker(constr_ecb_enc_1(X1,X0)) ),
    inference(flattening,[],[f316]) ).

fof(f316,plain,
    ! [X1,X0] :
      ( pred_attacker(constr_ecb_enc_1(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(ennf_transformation,[],[f231]) ).

fof(f231,plain,
    ! [X1,X0] :
      ( ( pred_attacker(X0)
        & pred_attacker(X1) )
     => pred_attacker(constr_ecb_enc_1(X1,X0)) ),
    inference(rectify,[],[f127]) ).

fof(f127,axiom,
    ! [X97,X96] :
      ( ( pred_attacker(X96)
        & pred_attacker(X97) )
     => pred_attacker(constr_ecb_enc_1(X96,X97)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax126) ).

fof(f1451,plain,
    ( ! [X8] : ~ pred_attacker(constr_ecb_enc_1(X8,constr_pkey(name_skA)))
    | ~ spl3_38 ),
    inference(avatar_component_clause,[],[f1450]) ).

fof(f1492,plain,
    ~ spl3_37,
    inference(avatar_contradiction_clause,[],[f1491]) ).

fof(f1491,plain,
    ( $false
    | ~ spl3_37 ),
    inference(subsumption_resolution,[],[f1490,f522]) ).

fof(f522,plain,
    pred_attacker(constr_CONST_3),
    inference(cnf_transformation,[],[f159]) ).

fof(f159,axiom,
    pred_attacker(constr_CONST_3),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax158) ).

fof(f1490,plain,
    ( ~ pred_attacker(constr_CONST_3)
    | ~ spl3_37 ),
    inference(equality_resolution,[],[f1489]) ).

fof(f1489,plain,
    ( ! [X0] :
        ( constr_CONST_3 != X0
        | ~ pred_attacker(X0) )
    | ~ spl3_37 ),
    inference(duplicate_literal_removal,[],[f1470]) ).

fof(f1470,plain,
    ( ! [X0] :
        ( constr_CONST_3 != X0
        | ~ pred_attacker(X0)
        | constr_CONST_3 != X0 )
    | ~ spl3_37 ),
    inference(superposition,[],[f492,f1458]) ).

fof(f1458,plain,
    ( ! [X0] :
        ( name_A = X0
        | ~ pred_attacker(X0)
        | constr_CONST_3 != X0 )
    | ~ spl3_37 ),
    inference(superposition,[],[f455,f1437]) ).

fof(f1437,plain,
    ( ! [X0] :
        ( name_B = X0
        | name_A = X0
        | ~ pred_attacker(X0) )
    | ~ spl3_37 ),
    inference(avatar_component_clause,[],[f1436]) ).

fof(f1436,plain,
    ( spl3_37
  <=> ! [X0] :
        ( ~ pred_attacker(X0)
        | name_A = X0
        | name_B = X0 ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_37])]) ).

fof(f455,plain,
    constr_CONST_3 != name_B,
    inference(cnf_transformation,[],[f36]) ).

fof(f36,axiom,
    constr_CONST_3 != name_B,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax35) ).

fof(f492,plain,
    constr_CONST_3 != name_A,
    inference(cnf_transformation,[],[f35]) ).

fof(f35,axiom,
    constr_CONST_3 != name_A,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax34) ).

fof(f1455,plain,
    ( spl3_38
    | spl3_38
    | spl3_39
    | ~ spl3_36 ),
    inference(avatar_split_clause,[],[f1448,f1311,f1453,f1450,f1450]) ).

fof(f1311,plain,
    ( spl3_36
  <=> ! [X10] :
        ( ~ pred_attacker(tuple_client_A_in_4(X10))
        | pred_attacker(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X10,name_skA))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_36])]) ).

fof(f1448,plain,
    ( ! [X8,X9,X7] :
        ( ~ pred_attacker(constr_ecb_enc_1(X7,constr_pkey(name_skA)))
        | ~ pred_attacker(constr_ecb_enc_1(X9,constr_pkey(name_skA)))
        | pred_attacker(X7)
        | ~ pred_attacker(constr_ecb_enc_1(X8,constr_pkey(name_skA))) )
    | ~ spl3_36 ),
    inference(resolution,[],[f1445,f535]) ).

fof(f535,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_3(X0,X2,X1))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X2)
      | ~ pred_attacker(X1) ),
    inference(cnf_transformation,[],[f424]) ).

fof(f424,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_3(X0,X2,X1))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X2) ),
    inference(rectify,[],[f365]) ).

fof(f365,plain,
    ! [X2,X1,X0] :
      ( pred_attacker(tuple_3(X2,X0,X1))
      | ~ pred_attacker(X2)
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f364]) ).

fof(f364,plain,
    ! [X2,X1,X0] :
      ( pred_attacker(tuple_3(X2,X0,X1))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X2) ),
    inference(ennf_transformation,[],[f204]) ).

fof(f204,plain,
    ! [X2,X1,X0] :
      ( ( pred_attacker(X0)
        & pred_attacker(X1)
        & pred_attacker(X2) )
     => pred_attacker(tuple_3(X2,X0,X1)) ),
    inference(rectify,[],[f168]) ).

fof(f168,axiom,
    ! [X161,X162,X160] :
      ( ( pred_attacker(X162)
        & pred_attacker(X161)
        & pred_attacker(X160) )
     => pred_attacker(tuple_3(X160,X161,X162)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax167) ).

fof(f1445,plain,
    ( ! [X2,X0,X1] :
        ( ~ pred_attacker(tuple_3(constr_ecb_enc_1(X1,constr_pkey(name_skA)),constr_ecb_enc_1(X0,constr_pkey(name_skA)),constr_ecb_enc_1(X2,constr_pkey(name_skA))))
        | pred_attacker(X0) )
    | ~ spl3_36 ),
    inference(resolution,[],[f1440,f519]) ).

fof(f519,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f329]) ).

fof(f329,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f286]) ).

fof(f286,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(rectify,[],[f153]) ).

fof(f153,axiom,
    ! [X134] :
      ( pred_attacker(X134)
     => pred_attacker(tuple_client_A_in_4(X134)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax152) ).

fof(f1440,plain,
    ( ! [X2,X0,X1] :
        ( ~ pred_attacker(tuple_client_A_in_4(tuple_3(constr_ecb_enc_1(X0,constr_pkey(name_skA)),constr_ecb_enc_1(X1,constr_pkey(name_skA)),constr_ecb_enc_1(X2,constr_pkey(name_skA)))))
        | pred_attacker(X1) )
    | ~ spl3_36 ),
    inference(forward_demodulation,[],[f1439,f583]) ).

fof(f583,plain,
    ! [X2,X0,X1] : constr_tuple_3_get_1_bitstring(tuple_3(X0,X1,X2)) = X1,
    inference(cnf_transformation,[],[f432]) ).

fof(f432,plain,
    ! [X0,X1,X2] : constr_tuple_3_get_1_bitstring(tuple_3(X0,X1,X2)) = X1,
    inference(rectify,[],[f256]) ).

fof(f256,plain,
    ! [X1,X0,X2] : constr_tuple_3_get_1_bitstring(tuple_3(X1,X0,X2)) = X0,
    inference(rectify,[],[f89]) ).

fof(f89,axiom,
    ! [X33,X32,X34] : constr_tuple_3_get_1_bitstring(tuple_3(X32,X33,X34)) = X33,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax88) ).

fof(f1439,plain,
    ( ! [X2,X0,X1] :
        ( ~ pred_attacker(tuple_client_A_in_4(tuple_3(constr_ecb_enc_1(X0,constr_pkey(name_skA)),constr_ecb_enc_1(X1,constr_pkey(name_skA)),constr_ecb_enc_1(X2,constr_pkey(name_skA)))))
        | pred_attacker(constr_tuple_3_get_1_bitstring(tuple_3(X0,X1,X2))) )
    | ~ spl3_36 ),
    inference(superposition,[],[f1312,f643]) ).

fof(f643,plain,
    ! [X2,X3,X0,X1] : tuple_3(X3,X0,X2) = constr_ecb_dec_3(tuple_3(constr_ecb_enc_1(X3,constr_pkey(X1)),constr_ecb_enc_1(X0,constr_pkey(X1)),constr_ecb_enc_1(X2,constr_pkey(X1))),X1),
    inference(definition_unfolding,[],[f453,f555]) ).

fof(f453,plain,
    ! [X2,X3,X0,X1] : constr_ecb_dec_3(constr_ecb_enc_3(X3,X0,X2,constr_pkey(X1)),X1) = tuple_3(X3,X0,X2),
    inference(cnf_transformation,[],[f407]) ).

fof(f407,plain,
    ! [X0,X1,X2,X3] : constr_ecb_dec_3(constr_ecb_enc_3(X3,X0,X2,constr_pkey(X1)),X1) = tuple_3(X3,X0,X2),
    inference(rectify,[],[f259]) ).

fof(f259,plain,
    ! [X3,X2,X1,X0] : constr_ecb_dec_3(constr_ecb_enc_3(X0,X3,X1,constr_pkey(X2)),X2) = tuple_3(X0,X3,X1),
    inference(rectify,[],[f83]) ).

fof(f83,axiom,
    ! [X12,X14,X11,X13] : constr_ecb_dec_3(constr_ecb_enc_3(X12,X13,X14,constr_pkey(X11)),X11) = tuple_3(X12,X13,X14),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax82) ).

fof(f1312,plain,
    ( ! [X10] :
        ( pred_attacker(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X10,name_skA)))
        | ~ pred_attacker(tuple_client_A_in_4(X10)) )
    | ~ spl3_36 ),
    inference(avatar_component_clause,[],[f1311]) ).

fof(f1438,plain,
    ( spl3_37
    | spl3_33
    | ~ spl3_34 ),
    inference(avatar_split_clause,[],[f1434,f1278,f1275,f1436]) ).

fof(f1278,plain,
    ( spl3_34
  <=> ! [X0,X1] :
        ( name_B = X0
        | ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
        | name_A = X0 ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_34])]) ).

fof(f1434,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(X1)
        | ~ pred_attacker(X0)
        | name_B = X0
        | name_A = X0 )
    | ~ spl3_34 ),
    inference(resolution,[],[f1279,f605]) ).

fof(f605,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(cnf_transformation,[],[f438]) ).

fof(f438,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(X1)
      | ~ pred_attacker(X0)
      | pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
    inference(rectify,[],[f344]) ).

fof(f344,plain,
    ! [X1,X0] :
      ( ~ pred_attacker(X0)
      | ~ pred_attacker(X1)
      | pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) ),
    inference(flattening,[],[f343]) ).

fof(f343,plain,
    ! [X1,X0] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(ennf_transformation,[],[f226]) ).

fof(f226,plain,
    ! [X1,X0] :
      ( ( pred_attacker(X0)
        & pred_attacker(X1) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) ),
    inference(rectify,[],[f115]) ).

fof(f115,axiom,
    ! [X70,X69] :
      ( ( pred_attacker(X70)
        & pred_attacker(X69) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X69,X70)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax114) ).

fof(f1279,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
        | name_A = X0
        | name_B = X0 )
    | ~ spl3_34 ),
    inference(avatar_component_clause,[],[f1278]) ).

fof(f1432,plain,
    ~ spl3_33,
    inference(avatar_contradiction_clause,[],[f1327]) ).

fof(f1327,plain,
    ( $false
    | ~ spl3_33 ),
    inference(resolution,[],[f1276,f490]) ).

fof(f490,plain,
    pred_attacker(name_c),
    inference(cnf_transformation,[],[f177]) ).

fof(f177,axiom,
    pred_attacker(name_c),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax176) ).

fof(f1276,plain,
    ( ! [X2] : ~ pred_attacker(X2)
    | ~ spl3_33 ),
    inference(avatar_component_clause,[],[f1275]) ).

fof(f1318,plain,
    ( spl3_29
    | ~ spl3_32 ),
    inference(avatar_split_clause,[],[f1316,f1264,f1247]) ).

fof(f1247,plain,
    ( spl3_29
  <=> ! [X11,X12,X10] :
        ( ~ pred_attacker(X12)
        | ~ pred_attacker(tuple_key_retrieval_server_in_1(X10,X11))
        | ~ pred_table(tuple_keys(X11,constr_pkey(X12))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_29])]) ).

fof(f1264,plain,
    ( spl3_32
  <=> ! [X0,X1] :
        ( ~ pred_attacker(X1)
        | ~ pred_attacker(tuple_client_A_in_2(constr_sign(tuple_2(X0,constr_pkey(X1)),name_skS))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_32])]) ).

fof(f1316,plain,
    ( ! [X2,X0,X1] :
        ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X1))
        | ~ pred_table(tuple_keys(X1,constr_pkey(X0)))
        | ~ pred_attacker(X0) )
    | ~ spl3_32 ),
    inference(resolution,[],[f1315,f903]) ).

fof(f1315,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(constr_sign(tuple_2(X1,constr_pkey(X0)),name_skS))
        | ~ pred_attacker(X0) )
    | ~ spl3_32 ),
    inference(resolution,[],[f1265,f536]) ).

fof(f536,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f306]) ).

fof(f306,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f289]) ).

fof(f289,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(rectify,[],[f155]) ).

fof(f155,axiom,
    ! [X136] :
      ( pred_attacker(X136)
     => pred_attacker(tuple_client_A_in_2(X136)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax154) ).

fof(f1265,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(tuple_client_A_in_2(constr_sign(tuple_2(X0,constr_pkey(X1)),name_skS)))
        | ~ pred_attacker(X1) )
    | ~ spl3_32 ),
    inference(avatar_component_clause,[],[f1264]) ).

fof(f1313,plain,
    ( spl3_36
    | spl3_32 ),
    inference(avatar_split_clause,[],[f1304,f1264,f1311]) ).

fof(f1304,plain,
    ! [X10,X8,X9] :
      ( ~ pred_attacker(tuple_client_A_in_2(constr_sign(tuple_2(X8,constr_pkey(X9)),name_skS)))
      | ~ pred_attacker(X9)
      | ~ pred_attacker(tuple_client_A_in_4(X10))
      | pred_attacker(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X10,name_skA))) ),
    inference(resolution,[],[f1294,f708]) ).

fof(f708,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(constr_ecb_enc_1(X0,constr_pkey(X1)))
      | pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(superposition,[],[f487,f449]) ).

fof(f449,plain,
    ! [X0,X1] : constr_ecb_dec_1(constr_ecb_enc_1(X1,constr_pkey(X0)),X0) = X1,
    inference(cnf_transformation,[],[f406]) ).

fof(f406,plain,
    ! [X0,X1] : constr_ecb_dec_1(constr_ecb_enc_1(X1,constr_pkey(X0)),X0) = X1,
    inference(rectify,[],[f293]) ).

fof(f293,plain,
    ! [X1,X0] : constr_ecb_dec_1(constr_ecb_enc_1(X0,constr_pkey(X1)),X1) = X0,
    inference(rectify,[],[f85]) ).

fof(f85,axiom,
    ! [X19,X18] : constr_ecb_dec_1(constr_ecb_enc_1(X19,constr_pkey(X18)),X18) = X19,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax84) ).

fof(f487,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_ecb_dec_1(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(cnf_transformation,[],[f412]) ).

fof(f412,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(X0)
      | ~ pred_attacker(X1)
      | pred_attacker(constr_ecb_dec_1(X1,X0)) ),
    inference(rectify,[],[f394]) ).

fof(f394,plain,
    ! [X1,X0] :
      ( ~ pred_attacker(X1)
      | ~ pred_attacker(X0)
      | pred_attacker(constr_ecb_dec_1(X0,X1)) ),
    inference(flattening,[],[f393]) ).

fof(f393,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_ecb_dec_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f255]) ).

fof(f255,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(constr_ecb_dec_1(X0,X1)) ),
    inference(rectify,[],[f131]) ).

fof(f131,axiom,
    ! [X104,X105] :
      ( ( pred_attacker(X105)
        & pred_attacker(X104) )
     => pred_attacker(constr_ecb_dec_1(X104,X105)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax130) ).

fof(f1294,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X2,name_skA)),X1))
      | ~ pred_attacker(tuple_client_A_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_client_A_in_4(X2)) ),
    inference(superposition,[],[f1291,f589]) ).

fof(f1291,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X1,name_skA)),constr_tuple_2_get_1_bitstring(X0)))
      | ~ pred_attacker(tuple_client_A_in_2(constr_sign(X0,name_skS)))
      | ~ pred_attacker(tuple_client_A_in_4(X1)) ),
    inference(superposition,[],[f1286,f502]) ).

fof(f1286,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))
      | ~ pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(tuple_client_A_in_4(X1)) ),
    inference(resolution,[],[f1283,f559]) ).

fof(f559,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_A_out_5(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f300]) ).

fof(f300,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_5(X0)) ),
    inference(ennf_transformation,[],[f249]) ).

fof(f249,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_out_5(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f147]) ).

fof(f147,axiom,
    ! [X125] :
      ( pred_attacker(tuple_client_A_out_5(X125))
     => pred_attacker(X125) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax146) ).

fof(f1283,plain,
    ! [X2,X0] :
      ( pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(subsumption_resolution,[],[f1282,f533]) ).

fof(f1282,plain,
    ! [X2,X0] :
      ( ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(X0,name_skA)))
      | pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
    inference(subsumption_resolution,[],[f1281,f533]) ).

fof(f1281,plain,
    ! [X2,X0,X1] :
      ( ~ pred_eq_bitstring_bitstring(name_Na(X1),constr_tuple_3_get_0x30(constr_ecb_dec_3(X0,name_skA)))
      | pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(X0,name_skA)))
      | ~ pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(tuple_client_A_in_2(X2)) ),
    inference(subsumption_resolution,[],[f601,f533]) ).

fof(f601,plain,
    ! [X2,X0,X1] :
      ( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(X0,name_skA)))
      | ~ pred_eq_bitstring_bitstring(name_Na(X1),constr_tuple_3_get_0x30(constr_ecb_dec_3(X0,name_skA)))
      | ~ pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(cnf_transformation,[],[f437]) ).

fof(f437,plain,
    ! [X0,X1,X2] :
      ( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_eq_bitstring_bitstring(name_Na(X1),constr_tuple_3_get_0x30(constr_ecb_dec_3(X0,name_skA)))
      | ~ pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(X0,name_skA))) ),
    inference(rectify,[],[f399]) ).

fof(f399,plain,
    ! [X2,X0,X1] :
      ( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
      | pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X2,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_3_get_0x30(constr_ecb_dec_3(X2,name_skA)))
      | ~ pred_attacker(tuple_client_A_in_4(X2))
      | ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(X2,name_skA))) ),
    inference(flattening,[],[f398]) ).

fof(f398,plain,
    ! [X2,X1,X0] :
      ( pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X2,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_3_get_0x30(constr_ecb_dec_3(X2,name_skA)))
      | ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_attacker(tuple_client_A_in_4(X2))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(X2,name_skA))) ),
    inference(ennf_transformation,[],[f209]) ).

fof(f209,plain,
    ! [X2,X1,X0] :
      ( ( pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
        & pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_3_get_0x30(constr_ecb_dec_3(X2,name_skA)))
        & pred_attacker(tuple_client_A_in_2(X1))
        & pred_attacker(tuple_client_A_in_4(X2))
        & pred_eq_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(X2,name_skA))) )
     => pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X2,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
    inference(rectify,[],[f190]) ).

fof(f190,axiom,
    ! [X186,X188,X187] :
      ( ( pred_attacker(tuple_client_A_in_2(X188))
        & pred_eq_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(X187,name_skA)))
        & pred_eq_bitstring_bitstring(name_Na(X186),constr_tuple_3_get_0x30(constr_ecb_dec_3(X187,name_skA)))
        & pred_attacker(tuple_client_A_in_4(X187))
        & pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X188,constr_pkey(name_skS)))) )
     => pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X187,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X188,constr_pkey(name_skS)))))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax189) ).

fof(f1280,plain,
    ( spl3_33
    | spl3_34
    | ~ spl3_29 ),
    inference(avatar_split_clause,[],[f1273,f1247,f1278,f1275]) ).

fof(f1273,plain,
    ( ! [X2,X0,X1] :
        ( name_B = X0
        | name_A = X0
        | ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
        | ~ pred_attacker(X2) )
    | ~ spl3_29 ),
    inference(subsumption_resolution,[],[f1272,f595]) ).

fof(f595,plain,
    ! [X0] :
      ( pred_attacker(constr_pkey(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f368]) ).

fof(f368,plain,
    ! [X0] :
      ( ~ pred_attacker(X0)
      | pred_attacker(constr_pkey(X0)) ),
    inference(ennf_transformation,[],[f200]) ).

fof(f200,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(constr_pkey(X0)) ),
    inference(rectify,[],[f106]) ).

fof(f106,axiom,
    ! [X60] :
      ( pred_attacker(X60)
     => pred_attacker(constr_pkey(X60)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax105) ).

fof(f1272,plain,
    ( ! [X2,X0,X1] :
        ( ~ pred_attacker(X2)
        | name_B = X0
        | name_A = X0
        | ~ pred_attacker(constr_pkey(X2))
        | ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) )
    | ~ spl3_29 ),
    inference(subsumption_resolution,[],[f1271,f638]) ).

fof(f638,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f367]) ).

fof(f367,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
      | pred_attacker(X0) ),
    inference(ennf_transformation,[],[f218]) ).

fof(f218,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f117]) ).

fof(f117,axiom,
    ! [X74,X73] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X73,X74))
     => pred_attacker(X74) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax116) ).

fof(f1271,plain,
    ( ! [X2,X0,X1] :
        ( ~ pred_attacker(X2)
        | ~ pred_attacker(X0)
        | ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
        | name_A = X0
        | ~ pred_attacker(constr_pkey(X2))
        | name_B = X0 )
    | ~ spl3_29 ),
    inference(resolution,[],[f1256,f617]) ).

fof(f617,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(cnf_transformation,[],[f440]) ).

fof(f440,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(rectify,[],[f404]) ).

fof(f404,plain,
    ! [X1,X0] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f403]) ).

fof(f403,plain,
    ! [X1,X0] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(ennf_transformation,[],[f247]) ).

fof(f247,plain,
    ! [X1,X0] :
      ( ( pred_attacker(X0)
        & pred_attacker(X1) )
     => pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
    inference(rectify,[],[f118]) ).

fof(f118,axiom,
    ! [X75,X76] :
      ( ( pred_attacker(X75)
        & pred_attacker(X76) )
     => pred_attacker(tuple_key_register_server_in_1(X75,X76)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax117) ).

fof(f1256,plain,
    ( ! [X2,X3,X4] :
        ( ~ pred_attacker(tuple_key_register_server_in_1(X4,constr_pkey(X2)))
        | name_A = X4
        | ~ pred_attacker(tuple_key_retrieval_server_in_1(X3,X4))
        | name_B = X4
        | ~ pred_attacker(X2) )
    | ~ spl3_29 ),
    inference(resolution,[],[f1248,f639]) ).

fof(f639,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | name_A = X0
      | name_B = X0
      | ~ pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
    inference(cnf_transformation,[],[f447]) ).

fof(f447,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | name_B = X0
      | name_A = X0
      | ~ pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
    inference(rectify,[],[f315]) ).

fof(f315,plain,
    ! [X1,X0] :
      ( pred_table(tuple_keys(X1,X0))
      | name_B = X1
      | name_A = X1
      | ~ pred_attacker(tuple_key_register_server_in_1(X1,X0)) ),
    inference(flattening,[],[f314]) ).

fof(f314,plain,
    ! [X1,X0] :
      ( pred_table(tuple_keys(X1,X0))
      | ~ pred_attacker(tuple_key_register_server_in_1(X1,X0))
      | name_B = X1
      | name_A = X1 ),
    inference(ennf_transformation,[],[f233]) ).

fof(f233,plain,
    ! [X1,X0] :
      ( ( pred_attacker(tuple_key_register_server_in_1(X1,X0))
        & name_B != X1
        & name_A != X1 )
     => pred_table(tuple_keys(X1,X0)) ),
    inference(rectify,[],[f195]) ).

fof(f195,axiom,
    ! [X200,X199] :
      ( ( name_B != X199
        & name_A != X199
        & pred_attacker(tuple_key_register_server_in_1(X199,X200)) )
     => pred_table(tuple_keys(X199,X200)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax194) ).

fof(f1248,plain,
    ( ! [X10,X11,X12] :
        ( ~ pred_table(tuple_keys(X11,constr_pkey(X12)))
        | ~ pred_attacker(X12)
        | ~ pred_attacker(tuple_key_retrieval_server_in_1(X10,X11)) )
    | ~ spl3_29 ),
    inference(avatar_component_clause,[],[f1247]) ).

fof(f1039,plain,
    ~ spl3_13,
    inference(avatar_contradiction_clause,[],[f1013]) ).

fof(f1013,plain,
    ( $false
    | ~ spl3_13 ),
    inference(resolution,[],[f954,f594]) ).

fof(f594,plain,
    pred_attacker(tuple_client_A_out_1(name_A,name_I)),
    inference(cnf_transformation,[],[f188]) ).

fof(f188,axiom,
    pred_attacker(tuple_client_A_out_1(name_A,name_I)),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax187) ).

fof(f954,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl3_13 ),
    inference(subsumption_resolution,[],[f953,f543]) ).

fof(f543,plain,
    pred_attacker(name_A),
    inference(cnf_transformation,[],[f180]) ).

fof(f180,axiom,
    pred_attacker(name_A),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax179) ).

fof(f953,plain,
    ( ! [X0] :
        ( ~ pred_attacker(X0)
        | ~ pred_attacker(name_A) )
    | ~ spl3_13 ),
    inference(resolution,[],[f939,f605]) ).

fof(f939,plain,
    ( ! [X1] : ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,name_A))
    | ~ spl3_13 ),
    inference(avatar_component_clause,[],[f938]) ).

fof(f892,plain,
    ( spl3_6
    | ~ spl3_4 ),
    inference(avatar_split_clause,[],[f891,f664,f719]) ).

fof(f719,plain,
    ( spl3_6
  <=> pred_attacker(name_objective) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_6])]) ).

fof(f664,plain,
    ( spl3_4
  <=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_4])]) ).

fof(f891,plain,
    ( pred_attacker(name_objective)
    | ~ spl3_4 ),
    inference(resolution,[],[f666,f558]) ).

fof(f558,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_B_out_6(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f380]) ).

fof(f380,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_B_out_6(X0))
      | pred_attacker(X0) ),
    inference(ennf_transformation,[],[f292]) ).

fof(f292,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_6(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f134]) ).

fof(f134,axiom,
    ! [X109] :
      ( pred_attacker(tuple_client_B_out_6(X109))
     => pred_attacker(X109) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax133) ).

fof(f666,plain,
    ( pred_attacker(tuple_client_B_out_6(name_objective))
    | ~ spl3_4 ),
    inference(avatar_component_clause,[],[f664]) ).

fof(f890,plain,
    ~ spl3_3,
    inference(avatar_contradiction_clause,[],[f856]) ).

fof(f856,plain,
    ( $false
    | ~ spl3_3 ),
    inference(resolution,[],[f814,f520]) ).

fof(f520,plain,
    pred_attacker(tuple_false),
    inference(cnf_transformation,[],[f122]) ).

fof(f122,axiom,
    pred_attacker(tuple_false),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax121) ).

fof(f814,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl3_3 ),
    inference(resolution,[],[f813,f539]) ).

fof(f813,plain,
    ( ! [X1] : ~ pred_attacker(tuple_client_B_in_2(X1))
    | ~ spl3_3 ),
    inference(subsumption_resolution,[],[f662,f533]) ).

fof(f662,plain,
    ( ! [X1] :
        ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
        | ~ pred_attacker(tuple_client_B_in_2(X1)) )
    | ~ spl3_3 ),
    inference(avatar_component_clause,[],[f661]) ).

fof(f661,plain,
    ( spl3_3
  <=> ! [X1] :
        ( ~ pred_attacker(tuple_client_B_in_2(X1))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS)))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_3])]) ).

fof(f812,plain,
    ~ spl3_2,
    inference(avatar_contradiction_clause,[],[f737]) ).

fof(f737,plain,
    ( $false
    | ~ spl3_2 ),
    inference(resolution,[],[f736,f579]) ).

fof(f579,plain,
    pred_attacker(constr_CONST_0x30),
    inference(cnf_transformation,[],[f162]) ).

fof(f162,axiom,
    pred_attacker(constr_CONST_0x30),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax161) ).

fof(f736,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl3_2 ),
    inference(resolution,[],[f735,f497]) ).

fof(f497,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f392]) ).

fof(f392,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f221]) ).

fof(f221,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_5(X0)) ),
    inference(rectify,[],[f140]) ).

fof(f140,axiom,
    ! [X118] :
      ( pred_attacker(X118)
     => pred_attacker(tuple_client_B_in_5(X118)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax139) ).

fof(f735,plain,
    ( ! [X3] : ~ pred_attacker(tuple_client_B_in_5(X3))
    | ~ spl3_2 ),
    inference(subsumption_resolution,[],[f659,f533]) ).

fof(f659,plain,
    ( ! [X2,X3] :
        ( ~ pred_attacker(tuple_client_B_in_5(X3))
        | ~ pred_eq_bitstring_bitstring(name_Nb(X2),constr_ecb_dec_1(X3,name_skB)) )
    | ~ spl3_2 ),
    inference(avatar_component_clause,[],[f658]) ).

fof(f658,plain,
    ( spl3_2
  <=> ! [X2,X3] :
        ( ~ pred_eq_bitstring_bitstring(name_Nb(X2),constr_ecb_dec_1(X3,name_skB))
        | ~ pred_attacker(tuple_client_B_in_5(X3)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_2])]) ).

fof(f722,plain,
    ( ~ spl3_5
    | ~ spl3_6 ),
    inference(avatar_split_clause,[],[f713,f719,f715]) ).

fof(f713,plain,
    ( ~ pred_attacker(name_objective)
    | ~ pred_attacker(sF1) ),
    inference(subsumption_resolution,[],[f712,f653]) ).

fof(f653,plain,
    ~ pred_attacker(sF2),
    inference(definition_folding,[],[f509,f652,f651]) ).

fof(f652,plain,
    tuple_2(sF1,name_objective) = sF2,
    introduced(function_definition,[]) ).

fof(f509,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(cnf_transformation,[],[f417]) ).

fof(f417,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(skolemisation,[status(esa),new_symbols(skolem,[sK0])],[f381,f416]) ).

fof(f416,plain,
    ( ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective))
   => ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)) ),
    introduced(choice_axiom,[]) ).

fof(f381,plain,
    ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(ennf_transformation,[],[f222]) ).

fof(f222,plain,
    ~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(rectify,[],[f197]) ).

fof(f197,negated_conjecture,
    ~ ! [X201] : pred_attacker(tuple_2(name_Nb(X201),name_objective)),
    inference(negated_conjecture,[],[f196]) ).

fof(f196,conjecture,
    ! [X201] : pred_attacker(tuple_2(name_Nb(X201),name_objective)),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',co0) ).

fof(f712,plain,
    ( ~ pred_attacker(name_objective)
    | pred_attacker(sF2)
    | ~ pred_attacker(sF1) ),
    inference(superposition,[],[f552,f652]) ).

fof(f552,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X1,X0))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f428]) ).

fof(f428,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X1,X0))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(rectify,[],[f374]) ).

fof(f374,plain,
    ! [X1,X0] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(flattening,[],[f373]) ).

fof(f373,plain,
    ! [X1,X0] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f285]) ).

fof(f285,plain,
    ! [X1,X0] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_2(X0,X1)) ),
    inference(rectify,[],[f172]) ).

fof(f172,axiom,
    ! [X172,X173] :
      ( ( pred_attacker(X172)
        & pred_attacker(X173) )
     => pred_attacker(tuple_2(X172,X173)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax171) ).

fof(f667,plain,
    ( spl3_1
    | spl3_2
    | spl3_3
    | spl3_4 ),
    inference(avatar_split_clause,[],[f517,f664,f661,f658,f655]) ).

fof(f517,plain,
    ! [X2,X3,X0,X1] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X2),constr_ecb_dec_1(X3,name_skB))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X3))
      | ~ pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS)))) ),
    inference(cnf_transformation,[],[f420]) ).

fof(f420,plain,
    ! [X0,X1,X2,X3] :
      ( ~ pred_attacker(tuple_client_B_in_3(X0))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X2),constr_ecb_dec_1(X3,name_skB))
      | ~ pred_attacker(tuple_client_B_in_5(X3))
      | ~ pred_attacker(tuple_client_B_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB))) ),
    inference(rectify,[],[f336]) ).

fof(f336,plain,
    ! [X0,X3,X1,X2] :
      ( ~ pred_attacker(tuple_client_B_in_3(X0))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_ecb_dec_1(X2,name_skB))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB))) ),
    inference(flattening,[],[f335]) ).

fof(f335,plain,
    ! [X3,X0,X1,X2] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB)))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_ecb_dec_1(X2,name_skB))
      | ~ pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(ennf_transformation,[],[f278]) ).

fof(f278,plain,
    ! [X3,X0,X1,X2] :
      ( ( pred_attacker(tuple_client_B_in_5(X2))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_2(X3))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB)))
        & pred_eq_bitstring_bitstring(name_Nb(X1),constr_ecb_dec_1(X2,name_skB))
        & pred_attacker(tuple_client_B_in_3(X0)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(rectify,[],[f193]) ).

fof(f193,axiom,
    ! [X193,X192,X194,X195] :
      ( ( pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X193,name_skB)))
        & pred_eq_bitstring_bitstring(name_Nb(X192),constr_ecb_dec_1(X194,name_skB))
        & pred_attacker(tuple_client_B_in_3(X193))
        & pred_attacker(tuple_client_B_in_2(X195))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X195,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_5(X194)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax192) ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.07/0.12  % Problem    : SWW964+1 : TPTP v8.1.0. Released v7.4.0.
% 0.07/0.13  % Command    : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s
% 0.13/0.34  % Computer : n010.cluster.edu
% 0.13/0.34  % Model    : x86_64 x86_64
% 0.13/0.34  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.34  % Memory   : 8042.1875MB
% 0.13/0.34  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.13/0.34  % CPULimit   : 300
% 0.13/0.34  % WCLimit    : 300
% 0.13/0.34  % DateTime   : Tue Aug 30 21:11:29 EDT 2022
% 0.13/0.34  % CPUTime    : 
% 0.19/0.56  % (24397)lrs+2_1:1_lcm=reverse:lma=on:sos=all:spb=goal_then_units:ss=included:urr=on:i=39:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/39Mi)
% 0.19/0.56  % (24390)dis+1002_1:12_drc=off:fd=preordered:tgt=full:i=99978:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99978Mi)
% 0.19/0.56  % (24414)dis+21_1:1_ep=RS:nwc=10.0:s2a=on:s2at=1.5:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 0.19/0.56  % (24413)dis+10_1:1_av=off:sos=on:sp=reverse_arity:ss=included:st=2.0:to=lpo:urr=ec_only:i=45:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/45Mi)
% 0.19/0.56  % (24398)dis+10_1:1_newcnf=on:sgt=8:sos=on:ss=axioms:to=lpo:urr=on:i=49:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/49Mi)
% 0.19/0.56  % (24419)lrs-11_1:1_nm=0:sac=on:sd=4:ss=axioms:st=3.0:i=24:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/24Mi)
% 0.19/0.57  % (24403)lrs+10_1:32_br=off:nm=16:sd=2:ss=axioms:st=2.0:urr=on:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.19/0.57  % (24415)lrs+11_1:1_plsq=on:plsqc=1:plsqr=32,1:ss=included:i=95:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/95Mi)
% 0.19/0.57  % (24405)lrs+10_1:1_drc=off:sp=reverse_frequency:spb=goal:to=lpo:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 0.19/0.58  % (24405)Instruction limit reached!
% 0.19/0.58  % (24405)------------------------------
% 0.19/0.58  % (24405)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.19/0.58  % (24406)lrs+1011_1:1_fd=preordered:fsd=on:sos=on:thsq=on:thsqc=64:thsqd=32:uwa=ground:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 0.19/0.58  % (24405)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.19/0.58  % (24405)Termination reason: Unknown
% 0.19/0.58  % (24405)Termination phase: Saturation
% 0.19/0.58  
% 0.19/0.58  % (24405)Memory used [KB]: 6396
% 0.19/0.58  % (24405)Time elapsed: 0.006 s
% 0.19/0.58  % (24405)Instructions burned: 7 (million)
% 0.19/0.58  % (24405)------------------------------
% 0.19/0.58  % (24405)------------------------------
% 0.19/0.58  % (24401)lrs+10_1:2_br=off:nm=4:ss=included:urr=on:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 0.19/0.58  % (24413)Refutation not found, incomplete strategy% (24413)------------------------------
% 0.19/0.58  % (24413)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.19/0.58  % (24413)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.19/0.58  % (24413)Termination reason: Refutation not found, incomplete strategy
% 0.19/0.58  
% 0.19/0.58  % (24413)Memory used [KB]: 2046
% 0.19/0.58  % (24413)Time elapsed: 0.149 s
% 0.19/0.58  % (24413)Instructions burned: 10 (million)
% 0.19/0.58  % (24413)------------------------------
% 0.19/0.58  % (24413)------------------------------
% 0.19/0.58  % (24399)lrs+10_1:1_br=off:sos=on:ss=axioms:st=2.0:urr=on:i=33:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/33Mi)
% 0.19/0.58  % (24392)dis+1002_1:1_aac=none:bd=off:sac=on:sos=on:spb=units:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 0.19/0.58  % (24406)Refutation not found, incomplete strategy% (24406)------------------------------
% 0.19/0.58  % (24406)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.19/0.58  % (24406)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.19/0.58  % (24406)Termination reason: Refutation not found, incomplete strategy
% 0.19/0.58  
% 0.19/0.58  % (24406)Memory used [KB]: 6652
% 0.19/0.58  % (24406)Time elapsed: 0.161 s
% 0.19/0.58  % (24406)Instructions burned: 9 (million)
% 0.19/0.58  % (24406)------------------------------
% 0.19/0.58  % (24406)------------------------------
% 0.19/0.59  % (24410)dis+1010_1:1_bs=on:ep=RS:erd=off:newcnf=on:nwc=10.0:s2a=on:sgt=32:ss=axioms:i=30:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/30Mi)
% 0.19/0.59  % (24417)dis+21_1:1_aac=none:abs=on:er=known:fde=none:fsr=off:nwc=5.0:s2a=on:s2at=4.0:sp=const_frequency:to=lpo:urr=ec_only:i=25:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/25Mi)
% 0.19/0.59  % (24408)ott+1010_1:1_sd=2:sos=on:sp=occurrence:ss=axioms:urr=on:i=2:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/2Mi)
% 0.19/0.59  % (24412)dis+1010_2:3_fs=off:fsr=off:nm=0:nwc=5.0:s2a=on:s2agt=32:i=82:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/82Mi)
% 1.82/0.59  % (24394)lrs+10_1:1024_nm=0:nwc=5.0:ss=axioms:i=13:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/13Mi)
% 1.82/0.59  % (24408)Instruction limit reached!
% 1.82/0.59  % (24408)------------------------------
% 1.82/0.59  % (24408)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.59  % (24408)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.59  % (24408)Termination reason: Unknown
% 1.82/0.59  % (24408)Termination phase: Preprocessing 1
% 1.82/0.59  
% 1.82/0.59  % (24408)Memory used [KB]: 1535
% 1.82/0.59  % (24408)Time elapsed: 0.005 s
% 1.82/0.59  % (24408)Instructions burned: 2 (million)
% 1.82/0.59  % (24400)lrs+10_1:1_ep=R:lcm=predicate:lma=on:sos=all:spb=goal:ss=included:i=12:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/12Mi)
% 1.82/0.59  % (24408)------------------------------
% 1.82/0.59  % (24408)------------------------------
% 1.82/0.59  % (24416)lrs+1011_1:1_fd=preordered:fsd=on:sos=on:thsq=on:thsqc=64:thsqd=32:uwa=ground:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 1.82/0.59  % (24396)dis+1010_1:50_awrs=decay:awrsf=128:nwc=10.0:s2pl=no:sp=frequency:ss=axioms:i=39:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/39Mi)
% 1.82/0.59  % (24395)dis+21_1:1_av=off:sos=on:sp=frequency:ss=included:to=lpo:i=15:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/15Mi)
% 1.82/0.59  % (24407)fmb+10_1:1_nm=2:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 1.82/0.60  % (24418)dis+2_3:1_aac=none:abs=on:ep=R:lcm=reverse:nwc=10.0:sos=on:sp=const_frequency:spb=units:urr=ec_only:i=8:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/8Mi)
% 1.82/0.60  % (24407)Instruction limit reached!
% 1.82/0.60  % (24407)------------------------------
% 1.82/0.60  % (24407)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60  % (24407)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60  % (24407)Termination reason: Unknown
% 1.82/0.60  % (24407)Termination phase: Preprocessing 2
% 1.82/0.60  
% 1.82/0.60  % (24407)Memory used [KB]: 1791
% 1.82/0.60  % (24407)Time elapsed: 0.002 s
% 1.82/0.60  % (24407)Instructions burned: 3 (million)
% 1.82/0.60  % (24407)------------------------------
% 1.82/0.60  % (24407)------------------------------
% 1.82/0.60  % (24393)lrs+10_5:1_br=off:fde=none:nwc=3.0:sd=1:sgt=10:sos=on:ss=axioms:urr=on:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 1.82/0.60  % (24401)Instruction limit reached!
% 1.82/0.60  % (24401)------------------------------
% 1.82/0.60  % (24401)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60  % (24401)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60  % (24401)Termination reason: Unknown
% 1.82/0.60  % (24401)Termination phase: Saturation
% 1.82/0.60  
% 1.82/0.60  % (24401)Memory used [KB]: 6396
% 1.82/0.60  % (24401)Time elapsed: 0.006 s
% 1.82/0.60  % (24401)Instructions burned: 8 (million)
% 1.82/0.60  % (24401)------------------------------
% 1.82/0.60  % (24401)------------------------------
% 1.82/0.60  % (24396)Refutation not found, incomplete strategy% (24396)------------------------------
% 1.82/0.60  % (24396)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60  % (24396)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60  % (24396)Termination reason: Refutation not found, incomplete strategy
% 1.82/0.60  
% 1.82/0.60  % (24396)Memory used [KB]: 6396
% 1.82/0.60  % (24396)Time elapsed: 0.176 s
% 1.82/0.60  % (24396)Instructions burned: 11 (million)
% 1.82/0.60  % (24396)------------------------------
% 1.82/0.60  % (24396)------------------------------
% 1.82/0.60  % (24409)dis-10_3:2_amm=sco:ep=RS:fsr=off:nm=10:sd=2:sos=on:ss=axioms:st=3.0:i=11:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/11Mi)
% 1.82/0.60  % (24418)Instruction limit reached!
% 1.82/0.60  % (24418)------------------------------
% 1.82/0.60  % (24418)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60  % (24418)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60  % (24418)Termination reason: Unknown
% 1.82/0.60  % (24418)Termination phase: Saturation
% 1.82/0.60  
% 1.82/0.60  % (24418)Memory used [KB]: 6524
% 1.82/0.60  % (24418)Time elapsed: 0.005 s
% 1.82/0.60  % (24418)Instructions burned: 9 (million)
% 1.82/0.60  % (24418)------------------------------
% 1.82/0.60  % (24418)------------------------------
% 1.82/0.60  % (24404)lrs+10_1:1_ins=3:sp=reverse_frequency:spb=goal:to=lpo:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 1.82/0.60  % (24391)lrs+10_1:1_gsp=on:sd=1:sgt=32:sos=on:ss=axioms:i=13:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/13Mi)
% 1.82/0.60  % (24402)lrs+10_1:4_av=off:bs=unit_only:bsr=unit_only:ep=RS:s2a=on:sos=on:sp=frequency:to=lpo:i=16:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/16Mi)
% 1.82/0.60  % (24409)Refutation not found, incomplete strategy% (24409)------------------------------
% 1.82/0.60  % (24409)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60  % (24409)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60  % (24409)Termination reason: Refutation not found, incomplete strategy
% 1.82/0.60  
% 1.82/0.60  % (24409)Memory used [KB]: 6268
% 1.82/0.60  % (24409)Time elapsed: 0.185 s
% 1.82/0.60  % (24409)Instructions burned: 5 (million)
% 1.82/0.60  % (24409)------------------------------
% 1.82/0.60  % (24409)------------------------------
% 1.82/0.60  % (24391)Refutation not found, incomplete strategy% (24391)------------------------------
% 1.82/0.60  % (24391)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60  % (24404)Instruction limit reached!
% 1.82/0.60  % (24404)------------------------------
% 1.82/0.60  % (24404)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60  % (24391)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60  % (24391)Termination reason: Refutation not found, incomplete strategy
% 1.82/0.60  % (24404)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60  
% 1.82/0.60  % (24404)Termination reason: Unknown
% 1.82/0.60  % (24404)Termination phase: Property scanning
% 1.82/0.60  
% 1.82/0.60  % (24391)Memory used [KB]: 6140
% 1.82/0.60  % (24391)Time elapsed: 0.144 s
% 1.82/0.60  % (24404)Memory used [KB]: 1791
% 1.82/0.60  % (24391)Instructions burned: 3 (million)
% 1.82/0.60  % (24391)------------------------------
% 1.82/0.60  % (24391)------------------------------
% 1.82/0.60  % (24404)Time elapsed: 0.003 s
% 1.82/0.60  % (24404)Instructions burned: 5 (million)
% 1.82/0.60  % (24404)------------------------------
% 1.82/0.60  % (24404)------------------------------
% 1.82/0.60  % (24392)Instruction limit reached!
% 1.82/0.60  % (24392)------------------------------
% 1.82/0.60  % (24392)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60  % (24392)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60  % (24392)Termination reason: Unknown
% 1.82/0.60  % (24392)Termination phase: Naming
% 1.82/0.60  
% 1.82/0.60  % (24392)Memory used [KB]: 1791
% 1.82/0.60  % (24392)Time elapsed: 0.004 s
% 1.82/0.60  % (24392)Instructions burned: 3 (million)
% 1.82/0.60  % (24392)------------------------------
% 1.82/0.60  % (24392)------------------------------
% 1.82/0.60  % (24419)Instruction limit reached!
% 1.82/0.60  % (24419)------------------------------
% 1.82/0.60  % (24419)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60  % (24419)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60  % (24419)Termination reason: Unknown
% 1.82/0.60  % (24419)Termination phase: Saturation
% 1.82/0.60  
% 1.82/0.60  % (24419)Memory used [KB]: 6652
% 1.82/0.60  % (24419)Time elapsed: 0.195 s
% 1.82/0.60  % (24419)Instructions burned: 25 (million)
% 1.82/0.60  % (24419)------------------------------
% 1.82/0.60  % (24419)------------------------------
% 1.82/0.60  % (24395)Refutation not found, incomplete strategy% (24395)------------------------------
% 1.82/0.60  % (24395)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60  % (24395)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60  % (24395)Termination reason: Refutation not found, incomplete strategy
% 1.82/0.60  
% 1.82/0.60  % (24395)Memory used [KB]: 2046
% 1.82/0.60  % (24395)Time elapsed: 0.183 s
% 1.82/0.60  % (24395)Instructions burned: 8 (million)
% 1.82/0.60  % (24395)------------------------------
% 1.82/0.60  % (24395)------------------------------
% 1.82/0.60  % (24402)Refutation not found, incomplete strategy% (24402)------------------------------
% 1.82/0.60  % (24402)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.61  % (24411)ott+21_1:1_erd=off:s2a=on:sac=on:sd=1:sgt=64:sos=on:ss=included:st=3.0:to=lpo:urr=on:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 2.05/0.61  % (24402)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.61  % (24402)Termination reason: Refutation not found, incomplete strategy
% 2.05/0.61  
% 2.05/0.61  % (24402)Memory used [KB]: 2046
% 2.05/0.61  % (24402)Time elapsed: 0.189 s
% 2.05/0.61  % (24402)Instructions burned: 9 (million)
% 2.05/0.61  % (24402)------------------------------
% 2.05/0.61  % (24402)------------------------------
% 2.05/0.61  % (24394)Refutation not found, incomplete strategy% (24394)------------------------------
% 2.05/0.61  % (24394)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.61  % (24394)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.61  % (24394)Termination reason: Refutation not found, incomplete strategy
% 2.05/0.61  
% 2.05/0.61  % (24394)Memory used [KB]: 6396
% 2.05/0.61  % (24394)Time elapsed: 0.177 s
% 2.05/0.61  % (24394)Instructions burned: 10 (million)
% 2.05/0.61  % (24394)------------------------------
% 2.05/0.61  % (24394)------------------------------
% 2.05/0.61  % (24400)Refutation not found, incomplete strategy% (24400)------------------------------
% 2.05/0.61  % (24400)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.61  % (24400)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.61  % (24400)Termination reason: Refutation not found, incomplete strategy
% 2.05/0.61  
% 2.05/0.61  % (24400)Memory used [KB]: 6524
% 2.05/0.61  % (24400)Time elapsed: 0.199 s
% 2.05/0.61  % (24400)Instructions burned: 10 (million)
% 2.05/0.61  % (24400)------------------------------
% 2.05/0.61  % (24400)------------------------------
% 2.05/0.62  % (24397)Instruction limit reached!
% 2.05/0.62  % (24397)------------------------------
% 2.05/0.62  % (24397)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.62  % (24417)Instruction limit reached!
% 2.05/0.62  % (24417)------------------------------
% 2.05/0.62  % (24417)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.62  % (24417)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.62  % (24417)Termination reason: Unknown
% 2.05/0.62  % (24417)Termination phase: Saturation
% 2.05/0.62  
% 2.05/0.62  % (24417)Memory used [KB]: 6780
% 2.05/0.62  % (24417)Time elapsed: 0.213 s
% 2.05/0.62  % (24417)Instructions burned: 25 (million)
% 2.05/0.62  % (24417)------------------------------
% 2.05/0.62  % (24417)------------------------------
% 2.05/0.62  % (24397)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.62  % (24397)Termination reason: Unknown
% 2.05/0.62  % (24397)Termination phase: Saturation
% 2.05/0.62  
% 2.05/0.62  % (24397)Memory used [KB]: 7164
% 2.05/0.62  % (24397)Time elapsed: 0.180 s
% 2.05/0.62  % (24397)Instructions burned: 39 (million)
% 2.05/0.62  % (24397)------------------------------
% 2.05/0.62  % (24397)------------------------------
% 2.16/0.63  % (24410)Refutation not found, incomplete strategy% (24410)------------------------------
% 2.16/0.63  % (24410)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.16/0.63  % (24410)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.16/0.63  % (24410)Termination reason: Refutation not found, incomplete strategy
% 2.16/0.63  
% 2.16/0.63  % (24410)Memory used [KB]: 6652
% 2.16/0.63  % (24410)Time elapsed: 0.208 s
% 2.16/0.63  % (24410)Instructions burned: 19 (million)
% 2.16/0.63  % (24410)------------------------------
% 2.16/0.63  % (24410)------------------------------
% 2.16/0.63  % (24398)Instruction limit reached!
% 2.16/0.63  % (24398)------------------------------
% 2.16/0.63  % (24398)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.16/0.64  % (24414)Refutation not found, incomplete strategy% (24414)------------------------------
% 2.16/0.64  % (24414)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.16/0.64  % (24390)First to succeed.
% 2.16/0.64  % (24399)Instruction limit reached!
% 2.16/0.64  % (24399)------------------------------
% 2.16/0.64  % (24399)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.16/0.64  % (24398)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.16/0.64  % (24398)Termination reason: Unknown
% 2.16/0.64  % (24398)Termination phase: Saturation
% 2.16/0.64  
% 2.16/0.64  % (24398)Memory used [KB]: 7164
% 2.16/0.64  % (24398)Time elapsed: 0.210 s
% 2.16/0.64  % (24398)Instructions burned: 49 (million)
% 2.16/0.64  % (24398)------------------------------
% 2.16/0.64  % (24398)------------------------------
% 2.16/0.64  % (24414)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.16/0.64  % (24414)Termination reason: Refutation not found, incomplete strategy
% 2.16/0.64  
% 2.16/0.64  % (24414)Memory used [KB]: 6908
% 2.16/0.64  % (24414)Time elapsed: 0.212 s
% 2.16/0.64  % (24414)Instructions burned: 40 (million)
% 2.16/0.64  % (24414)------------------------------
% 2.16/0.64  % (24414)------------------------------
% 2.16/0.65  % (24399)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.16/0.65  % (24399)Termination reason: Unknown
% 2.16/0.65  % (24399)Termination phase: Saturation
% 2.16/0.65  
% 2.16/0.65  % (24399)Memory used [KB]: 7164
% 2.16/0.65  % (24399)Time elapsed: 0.183 s
% 2.16/0.65  % (24399)Instructions burned: 34 (million)
% 2.16/0.65  % (24399)------------------------------
% 2.16/0.65  % (24399)------------------------------
% 2.16/0.67  % (24390)Refutation found. Thanks to Tanya!
% 2.16/0.67  % SZS status Theorem for theBenchmark
% 2.16/0.67  % SZS output start Proof for theBenchmark
% See solution above
% 2.16/0.67  % (24390)------------------------------
% 2.16/0.67  % (24390)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.16/0.67  % (24390)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.16/0.67  % (24390)Termination reason: Refutation
% 2.16/0.67  
% 2.16/0.67  % (24390)Memory used [KB]: 7036
% 2.16/0.67  % (24390)Time elapsed: 0.225 s
% 2.16/0.67  % (24390)Instructions burned: 47 (million)
% 2.16/0.67  % (24390)------------------------------
% 2.16/0.67  % (24390)------------------------------
% 2.16/0.67  % (24389)Success in time 0.304 s
%------------------------------------------------------------------------------