TSTP Solution File: SWW966+1 by iProver---3.9

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : iProver---3.9
% Problem  : SWW966+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : run_iprover %s %d THM

% Computer : n029.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Fri May  3 03:27:01 EDT 2024

% Result   : Theorem 111.09s 15.69s
% Output   : CNFRefutation 111.09s
% Verified : 
% SZS Type : ERROR: Analysing output (Could not find formula named definition)

% Comments : 
%------------------------------------------------------------------------------
fof(f67,axiom,
    name_A != name_objective,
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax66) ).

fof(f73,axiom,
    name_B != name_objective,
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax72) ).

fof(f92,axiom,
    ! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax91) ).

fof(f95,axiom,
    ! [X6,X7] : constr_checksign(constr_sign(X7,X6),constr_pkey(X6)) = X7,
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax94) ).

fof(f96,axiom,
    ! [X8] : constr_ZERO = constr_xor(X8,X8),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax95) ).

fof(f97,axiom,
    ! [X9] : constr_xor(X9,constr_ZERO) = X9,
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax96) ).

fof(f98,axiom,
    ! [X10,X11] : constr_xor(X10,X11) = constr_xor(X11,X10),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax97) ).

fof(f99,axiom,
    ! [X12,X13,X14] : constr_xor(X12,constr_xor(X13,X14)) = constr_xor(constr_xor(X12,X13),X14),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax98) ).

fof(f100,axiom,
    ! [X15,X16] : constr_tuple_2_get_1_bitstring(tuple_2(X15,X16)) = X16,
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax99) ).

fof(f101,axiom,
    ! [X17,X18] : constr_tuple_2_get_0x30_bitstring(tuple_2(X17,X18)) = X17,
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax100) ).

fof(f104,axiom,
    ! [X23,X24] : pred_eq_bitstring_bitstring(X23,X24),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax103) ).

fof(f105,axiom,
    ! [X25,X26] :
      ( ( pred_attacker(X26)
        & pred_attacker(X25) )
     => pred_attacker(constr_xor(X25,X26)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax104) ).

fof(f112,axiom,
    ! [X33] :
      ( pred_attacker(X33)
     => pred_attacker(constr_pkey(X33)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax111) ).

fof(f120,axiom,
    ! [X41] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X41))
     => pred_attacker(X41) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax119) ).

fof(f121,axiom,
    ! [X42,X43] :
      ( ( pred_attacker(X43)
        & pred_attacker(X42) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X42,X43)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax120) ).

fof(f124,axiom,
    ! [X48,X49] :
      ( ( pred_attacker(X49)
        & pred_attacker(X48) )
     => pred_attacker(tuple_key_register_server_in_1(X48,X49)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax123) ).

fof(f132,axiom,
    ! [X60] :
      ( pred_attacker(tuple_client_B_out_6(X60))
     => pred_attacker(X60) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax131) ).

fof(f134,axiom,
    ! [X62] :
      ( pred_attacker(tuple_client_B_out_4(X62))
     => pred_attacker(X62) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax133) ).

fof(f138,axiom,
    ! [X69] :
      ( pred_attacker(X69)
     => pred_attacker(tuple_client_B_in_5(X69)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax137) ).

fof(f140,axiom,
    ! [X71] :
      ( pred_attacker(X71)
     => pred_attacker(tuple_client_B_in_3(X71)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax139) ).

fof(f142,axiom,
    ! [X73] :
      ( pred_attacker(X73)
     => pred_attacker(tuple_client_B_in_2(X73)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax141) ).

fof(f145,axiom,
    ! [X76] :
      ( pred_attacker(tuple_client_A_out_5(X76))
     => pred_attacker(X76) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax144) ).

fof(f147,axiom,
    ! [X78] :
      ( pred_attacker(tuple_client_A_out_3(X78))
     => pred_attacker(X78) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax146) ).

fof(f151,axiom,
    ! [X85] :
      ( pred_attacker(X85)
     => pred_attacker(tuple_client_A_in_4(X85)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax150) ).

fof(f153,axiom,
    ! [X87] :
      ( pred_attacker(X87)
     => pred_attacker(tuple_client_A_in_2(X87)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax152) ).

fof(f157,axiom,
    ! [X93,X94] :
      ( ( pred_attacker(X94)
        & pred_attacker(X93) )
     => pred_attacker(constr_adec(X93,X94)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax156) ).

fof(f158,axiom,
    pred_attacker(constr_ZERO),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax157) ).

fof(f164,axiom,
    ! [X95,X96] :
      ( ( pred_attacker(X96)
        & pred_attacker(X95) )
     => pred_attacker(tuple_2(X95,X96)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax163) ).

fof(f171,axiom,
    pred_attacker(name_B),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax170) ).

fof(f172,axiom,
    pred_attacker(name_A),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax171) ).

fof(f175,axiom,
    pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax174) ).

fof(f176,axiom,
    pred_table(tuple_keys(name_B,constr_pkey(name_skB))),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax175) ).

fof(f181,axiom,
    ! [X107,X108] :
      ( ( pred_attacker(tuple_client_A_in_2(X108))
        & pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X108,constr_pkey(name_skS)))) )
     => pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X107),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X108,constr_pkey(name_skS)))))) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax180) ).

fof(f182,axiom,
    ! [X109,X110,X111] :
      ( ( pred_attacker(tuple_client_A_in_2(X111))
        & pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X111,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_A_in_4(X110))
        & pred_eq_bitstring_bitstring(name_I,constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X110,name_skA)),name_Na(X109))) )
     => pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X110,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X111,constr_pkey(name_skS)))))) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax181) ).

fof(f184,axiom,
    ! [X112,X113,X114] :
      ( ( pred_attacker(tuple_client_B_in_2(X114))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X114,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X113))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X113,name_skB))) )
     => pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X113,name_skB)),name_B),name_Nb(X112)),constr_tuple_2_get_1_bitstring(constr_checksign(X114,constr_pkey(name_skS)))))) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax183) ).

fof(f185,axiom,
    ! [X115,X116,X117,X118] :
      ( ( pred_attacker(tuple_client_B_in_2(X118))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X118,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X116))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X116,name_skB)))
        & pred_attacker(tuple_client_B_in_5(X117))
        & pred_eq_bitstring_bitstring(name_Nb(X115),constr_adec(X117,name_skB)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax184) ).

fof(f186,axiom,
    ! [X119,X120,X121] :
      ( ( pred_attacker(tuple_key_retrieval_server_in_1(X121,X119))
        & pred_table(tuple_keys(X119,X120)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X119,X120),name_skS))) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax185) ).

fof(f187,axiom,
    ! [X122,X123] :
      ( ( pred_attacker(tuple_key_register_server_in_1(X122,X123))
        & name_A != X122
        & name_B != X122 )
     => pred_table(tuple_keys(X122,X123)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax186) ).

fof(f188,conjecture,
    ! [X124] : pred_attacker(tuple_2(name_Nb(X124),name_objective)),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',co0) ).

fof(f189,negated_conjecture,
    ~ ! [X124] : pred_attacker(tuple_2(name_Nb(X124),name_objective)),
    inference(negated_conjecture,[],[f188]) ).

fof(f192,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
    inference(rectify,[],[f95]) ).

fof(f193,plain,
    ! [X0] : constr_ZERO = constr_xor(X0,X0),
    inference(rectify,[],[f96]) ).

fof(f194,plain,
    ! [X0] : constr_xor(X0,constr_ZERO) = X0,
    inference(rectify,[],[f97]) ).

fof(f195,plain,
    ! [X0,X1] : constr_xor(X0,X1) = constr_xor(X1,X0),
    inference(rectify,[],[f98]) ).

fof(f196,plain,
    ! [X0,X1,X2] : constr_xor(X0,constr_xor(X1,X2)) = constr_xor(constr_xor(X0,X1),X2),
    inference(rectify,[],[f99]) ).

fof(f197,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
    inference(rectify,[],[f100]) ).

fof(f198,plain,
    ! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
    inference(rectify,[],[f101]) ).

fof(f201,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(rectify,[],[f104]) ).

fof(f202,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(constr_xor(X0,X1)) ),
    inference(rectify,[],[f105]) ).

fof(f208,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(constr_pkey(X0)) ),
    inference(rectify,[],[f112]) ).

fof(f216,plain,
    ! [X0] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f120]) ).

fof(f217,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
    inference(rectify,[],[f121]) ).

fof(f220,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
    inference(rectify,[],[f124]) ).

fof(f227,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_6(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f132]) ).

fof(f229,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_4(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f134]) ).

fof(f233,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_5(X0)) ),
    inference(rectify,[],[f138]) ).

fof(f235,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(rectify,[],[f140]) ).

fof(f237,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_2(X0)) ),
    inference(rectify,[],[f142]) ).

fof(f240,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_out_5(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f145]) ).

fof(f242,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_out_3(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f147]) ).

fof(f246,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(rectify,[],[f151]) ).

fof(f248,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(rectify,[],[f153]) ).

fof(f252,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(constr_adec(X0,X1)) ),
    inference(rectify,[],[f157]) ).

fof(f253,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_2(X0,X1)) ),
    inference(rectify,[],[f164]) ).

fof(f260,plain,
    ! [X0,X1] :
      ( ( pred_attacker(tuple_client_A_in_2(X1))
        & pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS)))) )
     => pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X0),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
    inference(rectify,[],[f181]) ).

fof(f261,plain,
    ! [X0,X1,X2] :
      ( ( pred_attacker(tuple_client_A_in_2(X2))
        & pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_A_in_4(X1))
        & pred_eq_bitstring_bitstring(name_I,constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skA)),name_Na(X0))) )
     => pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
    inference(rectify,[],[f182]) ).

fof(f262,plain,
    ! [X0,X1,X2] :
      ( ( pred_attacker(tuple_client_B_in_2(X2))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X1))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) )
     => pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_B),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
    inference(rectify,[],[f184]) ).

fof(f263,plain,
    ! [X0,X1,X2,X3] :
      ( ( pred_attacker(tuple_client_B_in_2(X3))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X1))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
        & pred_attacker(tuple_client_B_in_5(X2))
        & pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(rectify,[],[f185]) ).

fof(f264,plain,
    ! [X0,X1,X2] :
      ( ( pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
        & pred_table(tuple_keys(X0,X1)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
    inference(rectify,[],[f186]) ).

fof(f265,plain,
    ! [X0,X1] :
      ( ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
        & name_A != X0
        & name_B != X0 )
     => pred_table(tuple_keys(X0,X1)) ),
    inference(rectify,[],[f187]) ).

fof(f266,plain,
    ~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(rectify,[],[f189]) ).

fof(f268,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_xor(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f202]) ).

fof(f269,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_xor(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f268]) ).

fof(f276,plain,
    ! [X0] :
      ( pred_attacker(constr_pkey(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f208]) ).

fof(f284,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
    inference(ennf_transformation,[],[f216]) ).

fof(f285,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f217]) ).

fof(f286,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f285]) ).

fof(f289,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f220]) ).

fof(f290,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f289]) ).

fof(f299,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_6(X0)) ),
    inference(ennf_transformation,[],[f227]) ).

fof(f301,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_4(X0)) ),
    inference(ennf_transformation,[],[f229]) ).

fof(f306,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f233]) ).

fof(f308,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f235]) ).

fof(f310,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f237]) ).

fof(f313,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_5(X0)) ),
    inference(ennf_transformation,[],[f240]) ).

fof(f315,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_3(X0)) ),
    inference(ennf_transformation,[],[f242]) ).

fof(f320,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f246]) ).

fof(f322,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f248]) ).

fof(f328,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_adec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f252]) ).

fof(f329,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_adec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f328]) ).

fof(f330,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f253]) ).

fof(f331,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f330]) ).

fof(f338,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X0),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS)))) ),
    inference(ennf_transformation,[],[f260]) ).

fof(f339,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X0),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS)))) ),
    inference(flattening,[],[f338]) ).

fof(f340,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skA)),name_Na(X0))) ),
    inference(ennf_transformation,[],[f261]) ).

fof(f341,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skA)),name_Na(X0))) ),
    inference(flattening,[],[f340]) ).

fof(f342,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_B),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
    inference(ennf_transformation,[],[f262]) ).

fof(f343,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_B),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
    inference(flattening,[],[f342]) ).

fof(f344,plain,
    ! [X0,X1,X2,X3] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
    inference(ennf_transformation,[],[f263]) ).

fof(f345,plain,
    ! [X0,X1,X2,X3] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
    inference(flattening,[],[f344]) ).

fof(f346,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | ~ pred_table(tuple_keys(X0,X1)) ),
    inference(ennf_transformation,[],[f264]) ).

fof(f347,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | ~ pred_table(tuple_keys(X0,X1)) ),
    inference(flattening,[],[f346]) ).

fof(f348,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | name_A = X0
      | name_B = X0 ),
    inference(ennf_transformation,[],[f265]) ).

fof(f349,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | name_A = X0
      | name_B = X0 ),
    inference(flattening,[],[f348]) ).

fof(f350,plain,
    ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(ennf_transformation,[],[f266]) ).

fof(f351,plain,
    ( ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective))
   => ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)) ),
    introduced(choice_axiom,[]) ).

fof(f352,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(skolemisation,[status(esa),new_symbols(skolem,[sK0])],[f350,f351]) ).

fof(f419,plain,
    name_A != name_objective,
    inference(cnf_transformation,[],[f67]) ).

fof(f425,plain,
    name_B != name_objective,
    inference(cnf_transformation,[],[f73]) ).

fof(f444,plain,
    ! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
    inference(cnf_transformation,[],[f92]) ).

fof(f447,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
    inference(cnf_transformation,[],[f192]) ).

fof(f448,plain,
    ! [X0] : constr_ZERO = constr_xor(X0,X0),
    inference(cnf_transformation,[],[f193]) ).

fof(f449,plain,
    ! [X0] : constr_xor(X0,constr_ZERO) = X0,
    inference(cnf_transformation,[],[f194]) ).

fof(f450,plain,
    ! [X0,X1] : constr_xor(X0,X1) = constr_xor(X1,X0),
    inference(cnf_transformation,[],[f195]) ).

fof(f451,plain,
    ! [X2,X0,X1] : constr_xor(X0,constr_xor(X1,X2)) = constr_xor(constr_xor(X0,X1),X2),
    inference(cnf_transformation,[],[f196]) ).

fof(f452,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
    inference(cnf_transformation,[],[f197]) ).

fof(f453,plain,
    ! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
    inference(cnf_transformation,[],[f198]) ).

fof(f456,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(cnf_transformation,[],[f201]) ).

fof(f457,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_xor(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f269]) ).

fof(f464,plain,
    ! [X0] :
      ( pred_attacker(constr_pkey(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f276]) ).

fof(f472,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
    inference(cnf_transformation,[],[f284]) ).

fof(f473,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f286]) ).

fof(f476,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f290]) ).

fof(f484,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_6(X0)) ),
    inference(cnf_transformation,[],[f299]) ).

fof(f486,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_4(X0)) ),
    inference(cnf_transformation,[],[f301]) ).

fof(f490,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f306]) ).

fof(f492,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f308]) ).

fof(f494,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f310]) ).

fof(f497,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_5(X0)) ),
    inference(cnf_transformation,[],[f313]) ).

fof(f499,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_3(X0)) ),
    inference(cnf_transformation,[],[f315]) ).

fof(f503,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f320]) ).

fof(f505,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f322]) ).

fof(f509,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_adec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f329]) ).

fof(f510,plain,
    pred_attacker(constr_ZERO),
    inference(cnf_transformation,[],[f158]) ).

fof(f516,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f331]) ).

fof(f523,plain,
    pred_attacker(name_B),
    inference(cnf_transformation,[],[f171]) ).

fof(f524,plain,
    pred_attacker(name_A),
    inference(cnf_transformation,[],[f172]) ).

fof(f526,plain,
    pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
    inference(cnf_transformation,[],[f175]) ).

fof(f527,plain,
    pred_table(tuple_keys(name_B,constr_pkey(name_skB))),
    inference(cnf_transformation,[],[f176]) ).

fof(f532,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X0),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS)))) ),
    inference(cnf_transformation,[],[f339]) ).

fof(f533,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skA)),name_Na(X0))) ),
    inference(cnf_transformation,[],[f341]) ).

fof(f535,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_B),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
    inference(cnf_transformation,[],[f343]) ).

fof(f536,plain,
    ! [X2,X3,X0,X1] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
    inference(cnf_transformation,[],[f345]) ).

fof(f537,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | ~ pred_table(tuple_keys(X0,X1)) ),
    inference(cnf_transformation,[],[f347]) ).

fof(f538,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | name_A = X0
      | name_B = X0 ),
    inference(cnf_transformation,[],[f349]) ).

fof(f539,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(cnf_transformation,[],[f352]) ).

cnf(c_115,plain,
    name_A != name_objective,
    inference(cnf_transformation,[],[f419]) ).

cnf(c_121,plain,
    name_B != name_objective,
    inference(cnf_transformation,[],[f425]) ).

cnf(c_140,plain,
    constr_adec(constr_aenc(X0,constr_pkey(X1)),X1) = X0,
    inference(cnf_transformation,[],[f444]) ).

cnf(c_143,plain,
    constr_checksign(constr_sign(X0,X1),constr_pkey(X1)) = X0,
    inference(cnf_transformation,[],[f447]) ).

cnf(c_144,plain,
    constr_xor(X0,X0) = constr_ZERO,
    inference(cnf_transformation,[],[f448]) ).

cnf(c_145,plain,
    constr_xor(X0,constr_ZERO) = X0,
    inference(cnf_transformation,[],[f449]) ).

cnf(c_146,plain,
    constr_xor(X0,X1) = constr_xor(X1,X0),
    inference(cnf_transformation,[],[f450]) ).

cnf(c_147,plain,
    constr_xor(constr_xor(X0,X1),X2) = constr_xor(X0,constr_xor(X1,X2)),
    inference(cnf_transformation,[],[f451]) ).

cnf(c_148,plain,
    constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
    inference(cnf_transformation,[],[f452]) ).

cnf(c_149,plain,
    constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
    inference(cnf_transformation,[],[f453]) ).

cnf(c_152,plain,
    pred_eq_bitstring_bitstring(X0,X1),
    inference(cnf_transformation,[],[f456]) ).

cnf(c_153,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(constr_xor(X1,X0)) ),
    inference(cnf_transformation,[],[f457]) ).

cnf(c_160,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(constr_pkey(X0)) ),
    inference(cnf_transformation,[],[f464]) ).

cnf(c_168,plain,
    ( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f472]) ).

cnf(c_169,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) ),
    inference(cnf_transformation,[],[f473]) ).

cnf(c_172,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_key_register_server_in_1(X1,X0)) ),
    inference(cnf_transformation,[],[f476]) ).

cnf(c_180,plain,
    ( ~ pred_attacker(tuple_client_B_out_6(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f484]) ).

cnf(c_182,plain,
    ( ~ pred_attacker(tuple_client_B_out_4(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f486]) ).

cnf(c_186,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_B_in_5(X0)) ),
    inference(cnf_transformation,[],[f490]) ).

cnf(c_188,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(cnf_transformation,[],[f492]) ).

cnf(c_190,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_B_in_2(X0)) ),
    inference(cnf_transformation,[],[f494]) ).

cnf(c_193,plain,
    ( ~ pred_attacker(tuple_client_A_out_5(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f497]) ).

cnf(c_195,plain,
    ( ~ pred_attacker(tuple_client_A_out_3(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f499]) ).

cnf(c_199,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(cnf_transformation,[],[f503]) ).

cnf(c_201,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(cnf_transformation,[],[f505]) ).

cnf(c_205,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(constr_adec(X1,X0)) ),
    inference(cnf_transformation,[],[f509]) ).

cnf(c_206,plain,
    pred_attacker(constr_ZERO),
    inference(cnf_transformation,[],[f510]) ).

cnf(c_212,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_2(X1,X0)) ),
    inference(cnf_transformation,[],[f516]) ).

cnf(c_219,plain,
    pred_attacker(name_B),
    inference(cnf_transformation,[],[f523]) ).

cnf(c_220,plain,
    pred_attacker(name_A),
    inference(cnf_transformation,[],[f524]) ).

cnf(c_222,plain,
    pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
    inference(cnf_transformation,[],[f526]) ).

cnf(c_223,plain,
    pred_table(tuple_keys(name_B,constr_pkey(name_skB))),
    inference(cnf_transformation,[],[f527]) ).

cnf(c_228,plain,
    ( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
    | ~ pred_attacker(tuple_client_A_in_2(X0))
    | pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X1),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
    inference(cnf_transformation,[],[f532]) ).

cnf(c_229,plain,
    ( ~ pred_eq_bitstring_bitstring(name_I,constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skA)),name_Na(X1)))
    | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
    | ~ pred_attacker(tuple_client_A_in_4(X0))
    | ~ pred_attacker(tuple_client_A_in_2(X2))
    | pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
    inference(cnf_transformation,[],[f533]) ).

cnf(c_231,plain,
    ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
    | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
    | ~ pred_attacker(tuple_client_B_in_3(X1))
    | ~ pred_attacker(tuple_client_B_in_2(X0))
    | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_B),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
    inference(cnf_transformation,[],[f535]) ).

cnf(c_232,plain,
    ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
    | ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_adec(X2,name_skB))
    | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
    | ~ pred_attacker(tuple_client_B_in_5(X2))
    | ~ pred_attacker(tuple_client_B_in_3(X3))
    | ~ pred_attacker(tuple_client_B_in_2(X0))
    | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(cnf_transformation,[],[f536]) ).

cnf(c_233,plain,
    ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
    | ~ pred_table(tuple_keys(X1,X2))
    | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS))) ),
    inference(cnf_transformation,[],[f537]) ).

cnf(c_234,plain,
    ( ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
    | X0 = name_A
    | X0 = name_B
    | pred_table(tuple_keys(X0,X1)) ),
    inference(cnf_transformation,[],[f538]) ).

cnf(c_235,negated_conjecture,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(cnf_transformation,[],[f539]) ).

cnf(c_243,plain,
    ( ~ pred_attacker(name_A)
    | pred_attacker(tuple_client_B_in_3(name_A)) ),
    inference(instantiation,[status(thm)],[c_188]) ).

cnf(c_244,plain,
    ( ~ pred_attacker(name_A)
    | pred_attacker(tuple_client_B_in_5(name_A)) ),
    inference(instantiation,[status(thm)],[c_186]) ).

cnf(c_252,plain,
    ( ~ pred_attacker(name_A)
    | pred_attacker(constr_pkey(name_A)) ),
    inference(instantiation,[status(thm)],[c_160]) ).

cnf(c_288,plain,
    ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
    | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
    | ~ pred_attacker(tuple_client_B_in_3(X1))
    | ~ pred_attacker(tuple_client_B_in_2(X0))
    | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(name_B,constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB))),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
    inference(theory_normalisation,[status(thm)],[c_231,c_147,c_146]) ).

cnf(c_323,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_B_in_2(X0)) ),
    inference(prop_impl_just,[status(thm)],[c_190]) ).

cnf(c_335,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(prop_impl_just,[status(thm)],[c_199]) ).

cnf(c_339,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(prop_impl_just,[status(thm)],[c_201]) ).

cnf(c_631,plain,
    ( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
    | ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X1),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
    inference(bin_hyper_res,[status(thm)],[c_228,c_339]) ).

cnf(c_632,plain,
    ( ~ pred_eq_bitstring_bitstring(name_I,constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skA)),name_Na(X1)))
    | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
    | ~ pred_attacker(tuple_client_A_in_2(X2))
    | ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
    inference(bin_hyper_res,[status(thm)],[c_229,c_335]) ).

cnf(c_633,plain,
    ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
    | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
    | ~ pred_attacker(tuple_client_B_in_3(X1))
    | ~ pred_attacker(X0)
    | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(name_B,constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB))),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
    inference(bin_hyper_res,[status(thm)],[c_288,c_323]) ).

cnf(c_634,plain,
    ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
    | ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_adec(X2,name_skB))
    | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
    | ~ pred_attacker(tuple_client_B_in_5(X2))
    | ~ pred_attacker(tuple_client_B_in_3(X3))
    | ~ pred_attacker(X0)
    | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(bin_hyper_res,[status(thm)],[c_232,c_323]) ).

cnf(c_665,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X1),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
    inference(backward_subsumption_resolution,[status(thm)],[c_631,c_152]) ).

cnf(c_666,plain,
    ( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
    | ~ pred_attacker(tuple_client_A_in_2(X0))
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
    inference(backward_subsumption_resolution,[status(thm)],[c_632,c_152]) ).

cnf(c_667,plain,
    ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X0,name_skB)))
    | ~ pred_attacker(tuple_client_B_in_3(X0))
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(name_B,constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB))),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
    inference(backward_subsumption_resolution,[status(thm)],[c_633,c_152]) ).

cnf(c_668,plain,
    ( ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X1,name_skB))
    | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
    | ~ pred_attacker(tuple_client_B_in_5(X1))
    | ~ pred_attacker(tuple_client_B_in_3(X2))
    | ~ pred_attacker(X3)
    | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(backward_subsumption_resolution,[status(thm)],[c_634,c_152]) ).

cnf(c_1171,plain,
    ( ~ pred_attacker(tuple_client_A_in_2(X0))
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_666,c_152]) ).

cnf(c_1186,plain,
    ( ~ pred_attacker(tuple_client_B_in_3(X0))
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(name_B,constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB))),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_667,c_152]) ).

cnf(c_1203,plain,
    ( ~ pred_attacker(tuple_client_B_in_5(X0))
    | ~ pred_attacker(tuple_client_B_in_3(X1))
    | ~ pred_attacker(X2)
    | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_668,c_152,c_152]) ).

cnf(c_1204,plain,
    ( ~ pred_attacker(tuple_client_B_in_5(name_A))
    | ~ pred_attacker(tuple_client_B_in_3(name_A))
    | ~ pred_attacker(name_A)
    | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(instantiation,[status(thm)],[c_1203]) ).

cnf(c_1205,plain,
    pred_attacker(tuple_client_B_out_6(name_objective)),
    inference(global_subsumption_just,[status(thm)],[c_1203,c_220,c_243,c_244,c_1204]) ).

cnf(c_1607,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(prop_impl_just,[status(thm)],[c_188]) ).

cnf(c_1627,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(prop_impl_just,[status(thm)],[c_201]) ).

cnf(c_1641,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(X1),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
    inference(prop_impl_just,[status(thm)],[c_665]) ).

cnf(c_1909,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
    inference(bin_hyper_res,[status(thm)],[c_1171,c_1627]) ).

cnf(c_1910,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(name_B,constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB))),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
    inference(bin_hyper_res,[status(thm)],[c_1186,c_1607]) ).

cnf(c_2782,plain,
    name_Nb(sK0) = sP0_iProver_def,
    definition ).

cnf(c_2783,plain,
    tuple_2(sP0_iProver_def,name_objective) = sP1_iProver_def,
    definition ).

cnf(c_2784,negated_conjecture,
    ~ pred_attacker(sP1_iProver_def),
    inference(demodulation,[status(thm)],[c_235,c_2782,c_2783]) ).

cnf(c_5300,plain,
    constr_xor(constr_ZERO,X0) = X0,
    inference(superposition,[status(thm)],[c_145,c_146]) ).

cnf(c_5494,plain,
    ( ~ pred_attacker(constr_xor(X0,X1))
    | ~ pred_attacker(X2)
    | pred_attacker(constr_xor(X0,constr_xor(X1,X2))) ),
    inference(superposition,[status(thm)],[c_147,c_153]) ).

cnf(c_5509,plain,
    ( ~ pred_table(tuple_keys(X0,X1))
    | ~ pred_attacker(X0)
    | ~ pred_attacker(X2)
    | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
    inference(superposition,[status(thm)],[c_169,c_233]) ).

cnf(c_5710,plain,
    ( ~ pred_attacker(constr_xor(X0,X1))
    | ~ pred_attacker(X2)
    | pred_attacker(constr_xor(constr_xor(X1,X2),X0)) ),
    inference(superposition,[status(thm)],[c_146,c_5494]) ).

cnf(c_5737,plain,
    ( ~ pred_attacker(constr_xor(X0,X1))
    | ~ pred_attacker(X2)
    | pred_attacker(constr_xor(X1,constr_xor(X2,X0))) ),
    inference(theory_normalisation,[status(thm)],[c_5710,c_147,c_146]) ).

cnf(c_5981,plain,
    ( ~ pred_attacker(constr_xor(X0,X1))
    | ~ pred_attacker(constr_ZERO)
    | pred_attacker(constr_xor(X1,X0)) ),
    inference(superposition,[status(thm)],[c_5300,c_5737]) ).

cnf(c_5987,plain,
    ( ~ pred_attacker(constr_xor(X0,X1))
    | pred_attacker(constr_xor(X1,X0)) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_5981,c_206]) ).

cnf(c_6076,plain,
    ( ~ pred_attacker(constr_xor(X0,constr_xor(X1,X2)))
    | pred_attacker(constr_xor(X2,constr_xor(X0,X1))) ),
    inference(superposition,[status(thm)],[c_147,c_5987]) ).

cnf(c_6114,plain,
    ( ~ pred_attacker(constr_xor(X0,constr_xor(X1,constr_xor(X2,X3))))
    | pred_attacker(constr_xor(X3,constr_xor(X0,constr_xor(X1,X2)))) ),
    inference(superposition,[status(thm)],[c_147,c_6076]) ).

cnf(c_8299,plain,
    ( ~ pred_attacker(constr_ZERO)
    | pred_attacker(constr_xor(X0,constr_xor(constr_xor(X1,constr_xor(X2,X0)),constr_xor(X1,X2)))) ),
    inference(superposition,[status(thm)],[c_144,c_6114]) ).

cnf(c_8337,plain,
    ( ~ pred_attacker(constr_ZERO)
    | pred_attacker(constr_xor(X0,constr_xor(X1,constr_xor(X2,constr_xor(X0,constr_xor(X1,X2)))))) ),
    inference(theory_normalisation,[status(thm)],[c_8299,c_147,c_146]) ).

cnf(c_8338,plain,
    pred_attacker(constr_xor(X0,constr_xor(X1,constr_xor(X2,constr_xor(X0,constr_xor(X1,X2)))))),
    inference(forward_subsumption_resolution,[status(thm)],[c_8337,c_206]) ).

cnf(c_8399,plain,
    pred_attacker(constr_xor(X0,constr_xor(constr_xor(X1,X2),constr_xor(X3,constr_xor(X0,constr_xor(X1,constr_xor(X2,X3))))))),
    inference(superposition,[status(thm)],[c_147,c_8338]) ).

cnf(c_8475,plain,
    pred_attacker(constr_xor(X0,constr_xor(X1,constr_xor(X2,constr_xor(X3,constr_xor(X0,constr_xor(X1,constr_xor(X2,X3)))))))),
    inference(theory_normalisation,[status(thm)],[c_8399,c_147,c_146]) ).

cnf(c_8654,plain,
    pred_attacker(constr_xor(X0,constr_xor(X1,constr_xor(X2,constr_xor(X3,constr_xor(X0,constr_xor(constr_xor(X2,X3),X1))))))),
    inference(superposition,[status(thm)],[c_146,c_8475]) ).

cnf(c_8714,plain,
    pred_attacker(constr_xor(X0,constr_xor(X1,constr_xor(X2,constr_xor(X3,constr_xor(X0,constr_xor(X2,constr_xor(X3,X1)))))))),
    inference(theory_normalisation,[status(thm)],[c_8654,c_147,c_146]) ).

cnf(c_25034,plain,
    ( ~ pred_table(tuple_keys(X0,X1))
    | ~ pred_attacker(X0)
    | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
    inference(superposition,[status(thm)],[c_8714,c_5509]) ).

cnf(c_278903,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(name_B,constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB))),sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
    inference(superposition,[status(thm)],[c_2782,c_1910]) ).

cnf(c_278985,plain,
    pred_attacker(name_objective),
    inference(superposition,[status(thm)],[c_1205,c_180]) ).

cnf(c_278996,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB))),sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))) ),
    inference(superposition,[status(thm)],[c_278903,c_182]) ).

cnf(c_279046,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))) ),
    inference(superposition,[status(thm)],[c_1909,c_193]) ).

cnf(c_279059,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(constr_aenc(tuple_2(name_Na(X1),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))) ),
    inference(superposition,[status(thm)],[c_1641,c_195]) ).

cnf(c_279157,plain,
    ( ~ pred_attacker(constr_aenc(X0,constr_pkey(name_skB)))
    | ~ pred_attacker(X1)
    | pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,constr_tuple_2_get_0x30_bitstring(X0)),sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))) ),
    inference(superposition,[status(thm)],[c_140,c_278996]) ).

cnf(c_279161,plain,
    ( ~ pred_attacker(constr_aenc(X0,constr_pkey(name_skA)))
    | ~ pred_attacker(X1)
    | pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))) ),
    inference(superposition,[status(thm)],[c_140,c_279046]) ).

cnf(c_279305,plain,
    ( ~ pred_attacker(constr_sign(X0,name_skS))
    | pred_attacker(constr_aenc(tuple_2(name_Na(X1),name_A),constr_tuple_2_get_1_bitstring(X0))) ),
    inference(superposition,[status(thm)],[c_143,c_279059]) ).

cnf(c_279338,plain,
    ( ~ pred_attacker(constr_aenc(X0,constr_pkey(X1)))
    | ~ pred_attacker(X1)
    | pred_attacker(X0) ),
    inference(superposition,[status(thm)],[c_140,c_205]) ).

cnf(c_279348,plain,
    ( ~ pred_attacker(name_objective)
    | ~ pred_attacker(sP0_iProver_def)
    | pred_attacker(sP1_iProver_def) ),
    inference(superposition,[status(thm)],[c_2783,c_212]) ).

cnf(c_279351,plain,
    ~ pred_attacker(sP0_iProver_def),
    inference(forward_subsumption_resolution,[status(thm)],[c_279348,c_2784,c_278985]) ).

cnf(c_279438,plain,
    ( ~ pred_attacker(constr_aenc(tuple_2(X0,X1),constr_pkey(name_skB)))
    | ~ pred_attacker(X2)
    | pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,X0),sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))) ),
    inference(superposition,[status(thm)],[c_149,c_279157]) ).

cnf(c_279457,plain,
    ( ~ pred_table(tuple_keys(X0,X1))
    | ~ pred_attacker(X0)
    | ~ pred_attacker(X2)
    | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
    inference(superposition,[status(thm)],[c_169,c_233]) ).

cnf(c_279470,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | X1 = name_A
    | X1 = name_B
    | pred_table(tuple_keys(X1,X0)) ),
    inference(superposition,[status(thm)],[c_172,c_234]) ).

cnf(c_279534,plain,
    ( ~ pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
    | pred_attacker(constr_aenc(tuple_2(name_Na(X2),name_A),X1)) ),
    inference(superposition,[status(thm)],[c_148,c_279305]) ).

cnf(c_280950,plain,
    ( ~ pred_attacker(constr_aenc(X0,constr_pkey(name_skA)))
    | ~ pred_attacker(constr_sign(X1,name_skS))
    | pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(X0),constr_tuple_2_get_1_bitstring(X1))) ),
    inference(superposition,[status(thm)],[c_143,c_279161]) ).

cnf(c_283396,plain,
    ( ~ pred_attacker(constr_aenc(tuple_2(X0,X1),constr_pkey(name_skA)))
    | ~ pred_attacker(constr_sign(X2,name_skS))
    | pred_attacker(constr_aenc(X1,constr_tuple_2_get_1_bitstring(X2))) ),
    inference(superposition,[status(thm)],[c_148,c_280950]) ).

cnf(c_284093,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_table(tuple_keys(X0,X1))
    | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
    inference(global_subsumption_just,[status(thm)],[c_279457,c_25034]) ).

cnf(c_284094,plain,
    ( ~ pred_table(tuple_keys(X0,X1))
    | ~ pred_attacker(X0)
    | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
    inference(renaming,[status(thm)],[c_284093]) ).

cnf(c_284102,plain,
    ( ~ pred_table(tuple_keys(X0,X1))
    | ~ pred_attacker(X0)
    | pred_attacker(constr_sign(tuple_2(X0,X1),name_skS)) ),
    inference(superposition,[status(thm)],[c_284094,c_168]) ).

cnf(c_284117,plain,
    ( ~ pred_table(tuple_keys(X0,X1))
    | ~ pred_attacker(X0)
    | pred_attacker(constr_aenc(tuple_2(name_Na(X2),name_A),X1)) ),
    inference(superposition,[status(thm)],[c_284102,c_279534]) ).

cnf(c_284167,plain,
    ( ~ pred_attacker(name_B)
    | pred_attacker(constr_aenc(tuple_2(name_Na(X0),name_A),constr_pkey(name_skB))) ),
    inference(superposition,[status(thm)],[c_223,c_284117]) ).

cnf(c_284168,plain,
    pred_attacker(constr_aenc(tuple_2(name_Na(X0),name_A),constr_pkey(name_skB))),
    inference(forward_subsumption_resolution,[status(thm)],[c_284167,c_219]) ).

cnf(c_284171,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,name_Na(X1)),sP0_iProver_def),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))) ),
    inference(superposition,[status(thm)],[c_284168,c_279438]) ).

cnf(c_284620,plain,
    ( ~ pred_attacker(constr_sign(X0,name_skS))
    | pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,name_Na(X1)),sP0_iProver_def),constr_tuple_2_get_1_bitstring(X0))) ),
    inference(superposition,[status(thm)],[c_143,c_284171]) ).

cnf(c_284627,plain,
    ( ~ pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
    | pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,name_Na(X2)),sP0_iProver_def),X1)) ),
    inference(superposition,[status(thm)],[c_148,c_284620]) ).

cnf(c_284649,plain,
    ( ~ pred_table(tuple_keys(X0,X1))
    | ~ pred_attacker(X0)
    | pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,name_Na(X2)),sP0_iProver_def),X1)) ),
    inference(superposition,[status(thm)],[c_284102,c_284627]) ).

cnf(c_293954,plain,
    ( ~ pred_attacker(name_A)
    | pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,name_Na(X0)),sP0_iProver_def),constr_pkey(name_skA))) ),
    inference(superposition,[status(thm)],[c_222,c_284649]) ).

cnf(c_293958,plain,
    pred_attacker(constr_aenc(tuple_2(constr_xor(name_B,name_Na(X0)),sP0_iProver_def),constr_pkey(name_skA))),
    inference(forward_subsumption_resolution,[status(thm)],[c_293954,c_220]) ).

cnf(c_296487,plain,
    ( ~ pred_attacker(constr_sign(X0,name_skS))
    | pred_attacker(constr_aenc(sP0_iProver_def,constr_tuple_2_get_1_bitstring(X0))) ),
    inference(superposition,[status(thm)],[c_293958,c_283396]) ).

cnf(c_296596,plain,
    ( ~ pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
    | pred_attacker(constr_aenc(sP0_iProver_def,X1)) ),
    inference(superposition,[status(thm)],[c_148,c_296487]) ).

cnf(c_296615,plain,
    ( ~ pred_table(tuple_keys(X0,X1))
    | ~ pred_attacker(X0)
    | pred_attacker(constr_aenc(sP0_iProver_def,X1)) ),
    inference(superposition,[status(thm)],[c_284102,c_296596]) ).

cnf(c_296665,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | X1 = name_A
    | X1 = name_B
    | pred_attacker(constr_aenc(sP0_iProver_def,X0)) ),
    inference(superposition,[status(thm)],[c_279470,c_296615]) ).

cnf(c_469173,plain,
    ( ~ pred_attacker(X0)
    | name_A = name_objective
    | name_B = name_objective
    | pred_attacker(constr_aenc(sP0_iProver_def,X0)) ),
    inference(superposition,[status(thm)],[c_278985,c_296665]) ).

cnf(c_469479,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(constr_aenc(sP0_iProver_def,X0)) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_469173,c_121,c_115]) ).

cnf(c_469490,plain,
    ( ~ pred_attacker(constr_pkey(X0))
    | ~ pred_attacker(X0)
    | pred_attacker(sP0_iProver_def) ),
    inference(superposition,[status(thm)],[c_469479,c_279338]) ).

cnf(c_469491,plain,
    ( ~ pred_attacker(constr_pkey(X0))
    | ~ pred_attacker(X0) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_469490,c_279351]) ).

cnf(c_469495,plain,
    ( ~ pred_attacker(constr_pkey(name_A))
    | ~ pred_attacker(name_A) ),
    inference(instantiation,[status(thm)],[c_469491]) ).

cnf(c_469496,plain,
    $false,
    inference(prop_impl_just,[status(thm)],[c_469495,c_252,c_220]) ).


%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.03/0.10  % Problem  : SWW966+1 : TPTP v8.1.2. Released v7.4.0.
% 0.03/0.11  % Command  : run_iprover %s %d THM
% 0.11/0.31  % Computer : n029.cluster.edu
% 0.11/0.31  % Model    : x86_64 x86_64
% 0.11/0.31  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.11/0.31  % Memory   : 8042.1875MB
% 0.11/0.31  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.11/0.32  % CPULimit : 300
% 0.11/0.32  % WCLimit  : 300
% 0.11/0.32  % DateTime : Thu May  2 22:37:37 EDT 2024
% 0.11/0.32  % CPUTime  : 
% 0.16/0.42  Running first-order theorem proving
% 0.16/0.42  Running: /export/starexec/sandbox/solver/bin/run_problem --schedule fof_schedule --heuristic_context casc_unsat --no_cores 8 /export/starexec/sandbox/benchmark/theBenchmark.p 300
% 111.09/15.69  % SZS status Started for theBenchmark.p
% 111.09/15.69  % SZS status Theorem for theBenchmark.p
% 111.09/15.69  
% 111.09/15.69  %---------------- iProver v3.9 (pre CASC 2024/SMT-COMP 2024) ----------------%
% 111.09/15.69  
% 111.09/15.69  ------  iProver source info
% 111.09/15.69  
% 111.09/15.69  git: date: 2024-05-02 19:28:25 +0000
% 111.09/15.69  git: sha1: a33b5eb135c74074ba803943bb12f2ebd971352f
% 111.09/15.69  git: non_committed_changes: false
% 111.09/15.69  
% 111.09/15.69  ------ Parsing...
% 111.09/15.69  ------ Clausification by vclausify_rel  & Parsing by iProver...
% 111.09/15.69  
% 111.09/15.69  ------ Preprocessing... sup_sim: 0  sf_s  rm: 2 0s  sf_e  pe_s  pe:1:0s pe_e  sup_sim: 0  sf_s  rm: 1 0s  sf_e  pe_s  pe_e 
% 111.09/15.69  
% 111.09/15.69  ------ Preprocessing... gs_s  sp: 0 0s  gs_e  snvd_s sp: 0 0s snvd_e 
% 111.09/15.69  
% 111.09/15.69  ------ Preprocessing... sf_s  rm: 1 0s  sf_e  sf_s  rm: 0 0s  sf_e 
% 111.09/15.69  ------ Proving...
% 111.09/15.69  ------ Problem Properties 
% 111.09/15.69  
% 111.09/15.69  
% 111.09/15.69  clauses                                 186
% 111.09/15.69  conjectures                             1
% 111.09/15.69  EPR                                     104
% 111.09/15.69  Horn                                    185
% 111.09/15.69  unary                                   127
% 111.09/15.69  binary                                  43
% 111.09/15.69  lits                                    262
% 111.09/15.69  lits eq                                 107
% 111.09/15.69  fd_pure                                 0
% 111.09/15.69  fd_pseudo                               0
% 111.09/15.69  fd_cond                                 1
% 111.09/15.69  fd_pseudo_cond                          0
% 111.09/15.69  AC symbols                              1
% 111.09/15.69  
% 111.09/15.69  ------ Schedule dynamic 5 is on 
% 111.09/15.69  
% 111.09/15.69  ------ Input Options "--resolution_flag false --inst_lit_sel_side none" Time Limit: 10.
% 111.09/15.69  
% 111.09/15.69  
% 111.09/15.69  ------ 
% 111.09/15.69  Current options:
% 111.09/15.69  ------ 
% 111.09/15.69  
% 111.09/15.69  
% 111.09/15.69  
% 111.09/15.69  
% 111.09/15.69  ------ Proving...
% 111.09/15.69  Proof_search_loop: time out after: 2815 full_loop iterations
% 111.09/15.69  
% 111.09/15.69  ------ Input Options"1. --res_lit_sel adaptive --res_lit_sel_side num_symb" Time Limit: 15.
% 111.09/15.69  
% 111.09/15.69  
% 111.09/15.69  ------ 
% 111.09/15.69  Current options:
% 111.09/15.69  ------ 
% 111.09/15.69  
% 111.09/15.69  
% 111.09/15.69  
% 111.09/15.69  
% 111.09/15.69  ------ Proving...
% 111.09/15.69  
% 111.09/15.69  
% 111.09/15.69  % SZS status Theorem for theBenchmark.p
% 111.09/15.69  
% 111.09/15.69  % SZS output start CNFRefutation for theBenchmark.p
% See solution above
% 111.09/15.70  
% 111.09/15.70  
%------------------------------------------------------------------------------