TSTP Solution File: SWV014-1 by Geo-III---2018C

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Geo-III---2018C
% Problem  : SWV014-1 : TPTP v8.1.0. Released v2.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : geo -tptp_input -nonempty -inputfile %s

% Computer : n014.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Sat Jul 23 06:20:53 EDT 2022

% Result   : Unsatisfiable 242.91s 243.10s
% Output   : Refutation 242.91s
% Verified : 
% SZS Type : -

% Comments : 
%------------------------------------------------------------------------------
%----WARNING: Could not form TPTP format derivation
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.03/0.12  % Problem  : SWV014-1 : TPTP v8.1.0. Released v2.4.0.
% 0.03/0.12  % Command  : geo -tptp_input -nonempty -inputfile %s
% 0.12/0.33  % Computer : n014.cluster.edu
% 0.12/0.33  % Model    : x86_64 x86_64
% 0.12/0.33  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.12/0.33  % Memory   : 8042.1875MB
% 0.12/0.33  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.12/0.33  % CPULimit : 300
% 0.12/0.33  % WCLimit  : 300
% 0.12/0.33  % DateTime : Fri Jul 22 16:09:57 EDT 2022
% 0.12/0.33  % CPUTime  : 
% 242.91/243.10  GeoParameters:
% 242.91/243.10  
% 242.91/243.10  tptp_input =     1
% 242.91/243.10  tptp_output =    0
% 242.91/243.10  nonempty =       1
% 242.91/243.10  inputfile =      /export/starexec/sandbox2/benchmark/theBenchmark.p
% 242.91/243.10  includepath =    /export/starexec/sandbox2/solver/bin/../../benchmark/
% 242.91/243.10  
% 242.91/243.10  
% 242.91/243.10  % SZS status Unsatisfiable for /export/starexec/sandbox2/benchmark/theBenchmark.p
% 242.91/243.10  % SZS output start Refutation for /export/starexec/sandbox2/benchmark/theBenchmark.p
% 242.91/243.10  
% 242.91/243.10  RuleSystem INPUT:
% 242.91/243.10  
% 242.91/243.10  Initial Rules:
% 242.91/243.10  #0: input, references = 4, size of lhs = 1:
% 242.91/243.10     P_a-{F}(V0) | party_of_protocol-{T}(V0)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1: input, references = 149, size of lhs = 5:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4) | message-{T}(V4)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #2: input, references = 3, size of lhs = 6:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5) | a_stored-{T}(V5)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3: input, references = 3, size of lhs = 18:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_pair-{F}(V8,V9,V10), a_stored-{F}(V10), P_encrypt-{F}(V12,V11,V14), P_pair-{F}(V13,V14,V15), P_sent-{F}(V0,V8,V15,V16), P_quadruple-{F}(V8,V9,V11,V17,V18), P_encrypt-{F}(V18,V7,V19), P_triple-{F}(V19,V13,V12,V20), P_sent-{F}(V6,V0,V20,V21), message-{F}(V21) | message-{T}(V16)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4: input, references = 9, size of lhs = 8:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7) | party_of_protocol-{T}(V1)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #5: input, references = 149, size of lhs = 8:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7) | fresh_to_b-{T}(V2)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #6: input, references = 13, size of lhs = 19:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_generate_b_nonce-{F}(V9,V10), P_generate_expiration_time-{F}(V9,V11), fresh_to_b-{F}(V9), P_triple-{F}(V12,V9,V11,V13), P_encrypt-{F}(V13,V8,V14), P_triple-{F}(V1,V10,V14,V15), P_sent-{F}(V1,V6,V15,V16), P_pair-{F}(V12,V9,V17), P_sent-{F}(V12,V1,V17,V18), message-{F}(V18) | message-{T}(V16)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #7: input, references = 149, size of lhs = 13:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), fresh_to_b-{F}(V9), P_pair-{F}(V10,V9,V11), P_sent-{F}(V10,V1,V11,V12), message-{F}(V12) | b_stored-{T}(V11)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #8: input, references = 4, size of lhs = 20:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V10,V9,V11), P_pair-{F}(V9,V12,V13), P_generate_expiration_time-{F}(V12,V14), P_triple-{F}(V9,V10,V14,V15), P_encrypt-{F}(V15,V8,V16), P_generate_b_nonce-{F}(V12,V17), P_encrypt-{F}(V17,V10,V18), P_pair-{F}(V16,V18,V19), P_sent-{F}(V9,V1,V19,V20), b_stored-{F}(V13), message-{F}(V20) | b_holds-{T}(V11)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #9: input, references = 3, size of lhs = 10:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9) | t_holds-{T}(V9)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #10: input, references = 3, size of lhs = 11:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10) | t_holds-{T}(V10)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #11: input, references = 85, size of lhs = 11:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10) | party_of_protocol-{T}(V6)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #12: input, references = 3, size of lhs = 28:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), P_generate_key-{F}(V11,V12), a_nonce-{F}(V11), P_key-{F}(V13,V14,V15), t_holds-{F}(V15), P_key-{F}(V16,V17,V18), t_holds-{F}(V18), P_quadruple-{F}(V17,V11,V12,V20,V21), P_encrypt-{F}(V21,V13,V22), P_triple-{F}(V14,V12,V20,V23), P_encrypt-{F}(V23,V16,V24), P_triple-{F}(V22,V24,V19,V25), P_sent-{F}(V6,V14,V25,V26), P_triple-{F}(V14,V11,V20,V27), P_encrypt-{F}(V27,V16,V28), P_triple-{F}(V17,V19,V28,V29), P_sent-{F}(V17,V6,V29,V30), message-{F}(V30) | message-{T}(V26)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #13: input, references = 159, size of lhs = 13:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), P_sent-{F}(V13,V12,V11,V14), message-{F}(V14) | intruder_message-{T}(V11)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #14: input, references = 89, size of lhs = 13:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), P_pair-{F}(V11,V12,V13), intruder_message-{F}(V13) | intruder_message-{T}(V11)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #15: input, references = 120, size of lhs = 13:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), P_pair-{F}(V12,V11,V13), intruder_message-{F}(V13) | intruder_message-{T}(V11)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #16: input, references = 3, size of lhs = 13:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), P_triple-{F}(V11,V12,V13,V14), intruder_message-{F}(V14) | intruder_message-{T}(V11)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #17: input, references = 6, size of lhs = 13:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), P_triple-{F}(V13,V11,V12,V14), intruder_message-{F}(V14) | intruder_message-{T}(V11)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #18: input, references = 6, size of lhs = 13:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), P_triple-{F}(V13,V12,V11,V14), intruder_message-{F}(V14) | intruder_message-{T}(V11)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #19: input, references = 3, size of lhs = 13:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), P_quadruple-{F}(V11,V13,V14,V12,V15), intruder_message-{F}(V15) | intruder_message-{T}(V11)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #20: input, references = 3, size of lhs = 13:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), P_quadruple-{F}(V14,V11,V13,V12,V15), intruder_message-{F}(V15) | intruder_message-{T}(V11)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #21: input, references = 3, size of lhs = 13:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), P_quadruple-{F}(V14,V13,V11,V12,V15), intruder_message-{F}(V15) | intruder_message-{T}(V11)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #22: input, references = 3, size of lhs = 13:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), P_quadruple-{F}(V14,V12,V13,V11,V15), intruder_message-{F}(V15) | intruder_message-{T}(V11)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #23: input, references = 23, size of lhs = 14:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), intruder_message-{F}(V11), P_pair-{F}(V12,V11,V13), intruder_message-{F}(V12) | intruder_message-{T}(V13)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #24: input, references = 25, size of lhs = 15:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), intruder_message-{F}(V11), intruder_message-{F}(V12), P_triple-{F}(V13,V11,V12,V14), intruder_message-{F}(V13) | intruder_message-{T}(V14)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #25: input, references = 31, size of lhs = 16:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), intruder_message-{F}(V11), intruder_message-{F}(V12), intruder_message-{F}(V13), P_quadruple-{F}(V14,V12,V13,V11,V15), intruder_message-{F}(V14) | intruder_message-{T}(V15)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #26: input, references = 3, size of lhs = 16:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), P_encrypt-{F}(V12,V11,V13), intruder_message-{F}(V13), P_key-{F}(V11,V14,V15), intruder_holds-{F}(V15), party_of_protocol-{F}(V14) | intruder_message-{T}(V11)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #27: input, references = 29, size of lhs = 15:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), party_of_protocol-{F}(V11), party_of_protocol-{F}(V12), P_sent-{F}(V11,V12,V13,V14), intruder_message-{F}(V13) | message-{T}(V14)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #28: input, references = 162, size of lhs = 14:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), party_of_protocol-{F}(V11), P_key-{F}(V12,V11,V13), intruder_message-{F}(V12) | intruder_holds-{T}(V13)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #29: input, references = 40, size of lhs = 16:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), P_encrypt-{F}(V12,V11,V13), intruder_message-{F}(V12), P_key-{F}(V11,V14,V15), intruder_holds-{F}(V15), party_of_protocol-{F}(V14) | intruder_message-{T}(V13)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #30: input, references = 3, size of lhs = 11:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10) | a_nonce-{T}(V2)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #31: input, references = 3, size of lhs = 12:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), P_generate_expiration_time-{F}(V11,V12) | a_nonce-{T}(V12)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #32: input, references = 3, size of lhs = 12:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), P_generate_b_nonce-{F}(V11,V12) | a_nonce-{T}(V12)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #33: input, references = 4, size of lhs = 15:
% 242.91/243.10     P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V3), P_sent-{F}(V0,V1,V3,V4), P_pair-{F}(V1,V2,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V0,V9), P_key-{F}(V8,V1,V10), P_key-{F}(V11,V0,V12), P_key-{F}(V11,V1,V13), b_holds-{F}(V12), intruder_holds-{F}(V13) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #34: input, references = 4, size of lhs = 0:
% 242.91/243.10     FALSE | EXISTS V0: P_a-{T}(V0)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #35: input, references = 113, size of lhs = 3:
% 242.91/243.10     #-{F} V0, #-{F} V1, #-{F} V2 | EXISTS V3: P_sent-{T}(V0,V1,V2,V3)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #36: input, references = 4, size of lhs = 0:
% 242.91/243.10     FALSE | EXISTS V0: P_b-{T}(V0)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #37: input, references = 21, size of lhs = 2:
% 242.91/243.10     #-{F} V0, #-{F} V1 | EXISTS V2: P_pair-{T}(V0,V1,V2)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #38: input, references = 5, size of lhs = 0:
% 242.91/243.10     FALSE | EXISTS V0: P_an_a_nonce-{T}(V0)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #39: input, references = 14, size of lhs = 2:
% 242.91/243.10     #-{F} V0, #-{F} V1 | EXISTS V2: P_encrypt-{T}(V0,V1,V2)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #40: input, references = 5, size of lhs = 0:
% 242.91/243.10     FALSE | EXISTS V0: P_t-{T}(V0)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #41: input, references = 10, size of lhs = 3:
% 242.91/243.10     #-{F} V0, #-{F} V1, #-{F} V2 | EXISTS V3: P_triple-{T}(V0,V1,V2,V3)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #42: input, references = 3, size of lhs = 4:
% 242.91/243.10     #-{F} V0, #-{F} V1, #-{F} V2, #-{F} V3 | EXISTS V4: P_quadruple-{T}(V0,V1,V2,V3,V4)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #43: input, references = 5, size of lhs = 0:
% 242.91/243.10     FALSE | EXISTS V0: P_at-{T}(V0)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #44: input, references = 8, size of lhs = 1:
% 242.91/243.10     #-{F} V0 | EXISTS V1: P_generate_b_nonce-{T}(V0,V1)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #45: input, references = 9, size of lhs = 1:
% 242.91/243.10     #-{F} V0 | EXISTS V1: P_generate_expiration_time-{T}(V0,V1)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #46: input, references = 7, size of lhs = 0:
% 242.91/243.10     FALSE | EXISTS V0: P_bt-{T}(V0)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #47: input, references = 31, size of lhs = 2:
% 242.91/243.10     #-{F} V0, #-{F} V1 | EXISTS V2: P_key-{T}(V0,V1,V2)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #48: input, references = 3, size of lhs = 1:
% 242.91/243.10     #-{F} V0 | EXISTS V1: P_generate_key-{T}(V0,V1)
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  number of initial rules = 49
% 242.91/243.10  
% 242.91/243.10  Simplifiers:
% 242.91/243.10  #49: unsound, references = 3, size of lhs = 3:
% 242.91/243.10     fresh_to_b-{F}(V0), fresh_to_b-{F}(V1), V0 == V1 | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #50: unsound, references = 3, size of lhs = 3:
% 242.91/243.10     P_a-{F}(V0), P_a-{F}(V1), V0 == V1 | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #51: unsound, references = 3, size of lhs = 3:
% 242.91/243.10     P_sent-{F}(V0,V1,V2,V3), P_sent-{F}(V0,V1,V2,V7), V3 == V7 | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #52: unsound, references = 3, size of lhs = 3:
% 242.91/243.10     P_b-{F}(V0), P_b-{F}(V1), V0 == V1 | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #53: unsound, references = 3, size of lhs = 3:
% 242.91/243.10     P_pair-{F}(V0,V1,V2), P_pair-{F}(V0,V1,V5), V2 == V5 | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #54: unsound, references = 3, size of lhs = 3:
% 242.91/243.10     P_an_a_nonce-{F}(V0), P_an_a_nonce-{F}(V1), V0 == V1 | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #55: unsound, references = 3, size of lhs = 3:
% 242.91/243.10     P_encrypt-{F}(V0,V1,V2), P_encrypt-{F}(V0,V1,V5), V2 == V5 | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #56: unsound, references = 3, size of lhs = 3:
% 242.91/243.10     P_t-{F}(V0), P_t-{F}(V1), V0 == V1 | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #57: unsound, references = 3, size of lhs = 3:
% 242.91/243.10     P_triple-{F}(V0,V1,V2,V3), P_triple-{F}(V0,V1,V2,V7), V3 == V7 | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #58: unsound, references = 3, size of lhs = 3:
% 242.91/243.10     P_quadruple-{F}(V0,V1,V2,V3,V4), P_quadruple-{F}(V0,V1,V2,V3,V9), V4 == V9 | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #59: unsound, references = 3, size of lhs = 3:
% 242.91/243.10     P_at-{F}(V0), P_at-{F}(V1), V0 == V1 | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #60: unsound, references = 3, size of lhs = 3:
% 242.91/243.10     P_generate_b_nonce-{F}(V0,V1), P_generate_b_nonce-{F}(V0,V3), V1 == V3 | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #61: unsound, references = 3, size of lhs = 3:
% 242.91/243.10     P_generate_expiration_time-{F}(V0,V1), P_generate_expiration_time-{F}(V0,V3), V1 == V3 | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #62: unsound, references = 3, size of lhs = 3:
% 242.91/243.10     P_bt-{F}(V0), P_bt-{F}(V1), V0 == V1 | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #63: unsound, references = 3, size of lhs = 3:
% 242.91/243.10     P_key-{F}(V0,V1,V2), P_key-{F}(V0,V1,V5), V2 == V5 | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #64: unsound, references = 3, size of lhs = 3:
% 242.91/243.10     P_generate_key-{F}(V0,V1), P_generate_key-{F}(V0,V3), V1 == V3 | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  number of simplifiers = 16
% 242.91/243.10  
% 242.91/243.10  Learnt:
% 242.91/243.10  #100: mergings( V4 == V15, V15 == V24, V5 == V1, V1 == V25, V6 == V16, V7 == V17, V8 == V18, V9 == V19, V16 == V26, V17 == V27, V18 == V28, V19 == V29, V10 == V20, V20 == V30, V11 == V21, V21 == V31, V12 == V22, V22 == V32, V13 == V33, V14 == V34; #79 ), references = 10, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), intruder_message-{F}(V2), b_stored-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_sent-{F}(V4,V1,V6,V7), P_pair-{F}(V1,V5,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V10,V4,V12), P_key-{F}(V11,V1,V13), intruder_holds-{F}(V14), P_key-{F}(V15,V1,V14), P_key-{F}(V15,V4,V16), P_key-{F}(V17,V0,V16), P_pair-{F}(V0,V18,V3), P_generate_expiration_time-{F}(V18,V19), P_triple-{F}(V0,V17,V19,V20), P_encrypt-{F}(V20,V11,V21), P_generate_b_nonce-{F}(V18,V22), P_encrypt-{F}(V22,V17,V23), P_pair-{F}(V21,V23,V2) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #114: mergings( V3 == V17, V4 == V15, V5 == V18, V6 == V19, V7 == V20, V8 == V21, V9 == V22, V10 == V23, V11 == V24, V12 == V25, V13 == V26; #102 ), references = 5, size of lhs = 26:
% 242.91/243.10     intruder_message-{F}(V0), intruder_message-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), b_stored-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_sent-{F}(V5,V3,V7,V8), P_pair-{F}(V3,V6,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V11,V5,V13), P_key-{F}(V12,V3,V14), intruder_holds-{F}(V15), P_key-{F}(V16,V3,V15), P_key-{F}(V16,V5,V17), P_key-{F}(V18,V2,V17), P_pair-{F}(V2,V19,V4), P_generate_expiration_time-{F}(V19,V20), P_triple-{F}(V2,V18,V20,V21), P_encrypt-{F}(V21,V12,V1), P_generate_b_nonce-{F}(V19,V22), P_encrypt-{F}(V22,V18,V0) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #127: mergings( V3 == V19, V4 == V17, V5 == V20, V6 == V21, V7 == V22, V8 == V23, V9 == V24, V10 == V25, V11 == V26, V12 == V27, V13 == V28; #115 ), references = 3, size of lhs = 26:
% 242.91/243.10     intruder_message-{F}(V0), intruder_message-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), b_stored-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_sent-{F}(V5,V3,V7,V8), P_pair-{F}(V3,V6,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V11,V5,V13), P_key-{F}(V12,V3,V14), intruder_holds-{F}(V15), P_key-{F}(V16,V3,V15), P_key-{F}(V16,V5,V17), P_key-{F}(V18,V2,V17), P_pair-{F}(V2,V19,V4), P_generate_expiration_time-{F}(V19,V20), P_triple-{F}(V2,V18,V20,V21), P_encrypt-{F}(V21,V12,V1), P_generate_b_nonce-{F}(V19,V22), P_encrypt-{F}(V22,V18,V0) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #152: mergings( V3 == V16, V16 == V31, V4 == V17, V17 == V29, V5 == V18, V6 == V19, V7 == V20, V8 == V21, V18 == V32, V19 == V33, V20 == V34, V21 == V35, V9 == V22, V22 == V36, V10 == V23, V23 == V37, V11 == V24, V24 == V1, V12 == V25, V13 == V26, V25 == V38, V26 == V39; #129 ), references = 5, size of lhs = 28:
% 242.91/243.10     intruder_message-{F}(V0), intruder_holds-{F}(V1), party_of_protocol-{F}(V2), intruder_message-{F}(V3), party_of_protocol-{F}(V4), party_of_protocol-{F}(V5), P_b-{F}(V5), b_stored-{F}(V6), P_a-{F}(V7), P_an_a_nonce-{F}(V8), P_pair-{F}(V7,V8,V9), P_sent-{F}(V7,V5,V9,V10), P_pair-{F}(V5,V8,V11), P_t-{F}(V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V14,V2,V1), P_key-{F}(V13,V7,V15), P_key-{F}(V14,V5,V16), intruder_holds-{F}(V17), P_key-{F}(V18,V5,V17), P_key-{F}(V18,V7,V19), P_key-{F}(V20,V4,V19), P_pair-{F}(V4,V21,V6), P_generate_expiration_time-{F}(V21,V22), P_triple-{F}(V4,V20,V22,V0), P_generate_b_nonce-{F}(V21,V23), P_encrypt-{F}(V23,V20,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #188: mergings( V4 == V15, V15 == V28, V28 == V42, V5 == V16, V16 == V29, V29 == V40, V6 == V17, V7 == V18, V8 == V19, V9 == V20, V17 == V30, V18 == V31, V19 == V32, V20 == V33, V30 == V43, V31 == V44, V32 == V45, V33 == V46, V10 == V21, V21 == V34, V34 == V47, V11 == V22, V22 == V35, V35 == V48, V12 == V23, V23 == V36, V36 == V49, V13 == V24, V14 == V25, V24 == V37, V25 == V38, V37 == V50, V38 == V51; #154 ), references = 37, size of lhs = 29:
% 242.91/243.10     intruder_message-{F}(V0), intruder_message-{F}(V1), intruder_message-{F}(V2), party_of_protocol-{F}(V2), intruder_holds-{F}(V3), party_of_protocol-{F}(V4), intruder_message-{F}(V5), party_of_protocol-{F}(V6), P_b-{F}(V6), b_stored-{F}(V7), P_a-{F}(V8), P_an_a_nonce-{F}(V9), P_pair-{F}(V8,V9,V10), P_sent-{F}(V8,V6,V10,V11), P_pair-{F}(V6,V9,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V15,V4,V3), P_key-{F}(V14,V8,V16), P_key-{F}(V15,V6,V17), intruder_holds-{F}(V18), P_key-{F}(V19,V6,V18), P_key-{F}(V19,V8,V20), P_key-{F}(V0,V2,V20), P_pair-{F}(V2,V21,V7), P_generate_expiration_time-{F}(V21,V1), P_generate_b_nonce-{F}(V21,V22), P_encrypt-{F}(V22,V0,V5) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #248: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V43, V37 == V44, V43 == V51, V44 == V52, V51 == V58, V52 == V59, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V45, V45 == V53, V53 == V60, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V46, V46 == V54, V54 == V61, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V47, V47 == V55, V55 == V62, V20 == V27, V27 == V34, V34 == V42, V42 == V49, V49 == V57, V57 == V67, V19 == V26, V26 == V33, V33 == V41, V41 == V48, V48 == V56, V56 == V66; #195 ), references = 1, size of lhs = 24:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V1), P_pair-{F}(V3,V5,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V9,V2,V10), P_key-{F}(V11,V0,V10), P_pair-{F}(V12,V11,V1), P_key-{F}(V8,V4,V13), P_key-{F}(V9,V3,V14), P_key-{F}(V15,V3,V10), P_key-{F}(V15,V4,V16), P_key-{F}(V11,V1,V16), P_generate_expiration_time-{F}(V17,V1), P_pair-{F}(V1,V17,V1), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V11,V1) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #311: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V45, V36 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V49, V20 == V27, V27 == V34, V34 == V41, V41 == V53, V19 == V26, V26 == V33, V33 == V40, V40 == V52; #270 ), references = 2, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V12,V0,V11), P_key-{F}(V9,V4,V13), P_key-{F}(V10,V3,V14), P_key-{F}(V15,V3,V11), P_key-{F}(V15,V4,V16), P_key-{F}(V12,V1,V16), P_generate_expiration_time-{F}(V17,V1), P_pair-{F}(V1,V17,V6), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V12,V1), P_pair-{F}(V1,V19,V6), P_pair-{F}(V20,V12,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #339: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V17, V17 == V30, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V18, V18 == V31, V7 == V10, V10 == V13, V13 == V16, V16 == V19, V19 == V32, V22 == V23, V23 == V24, V24 == V25, V25 == V35, V26 == V27, V27 == V28, V28 == V29, V29 == V34, V33 == V37; #312 ), references = 1, size of lhs = 18:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_expiration_time-{F}(V3,V2), P_t-{F}(V4), P_at-{F}(V5), P_bt-{F}(V6), P_key-{F}(V6,V1,V7), P_key-{F}(V3,V0,V7), P_key-{F}(V3,V2,V7), P_key-{F}(V5,V2,V8), P_key-{F}(V6,V2,V9), P_key-{F}(V10,V2,V7), P_generate_b_nonce-{F}(V3,V11), P_encrypt-{F}(V11,V3,V2) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #350: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V12, V4 == V6, V6 == V0, V7 == V0; #340 ), references = 1, size of lhs = 10:
% 242.91/243.10     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V0), P_an_a_nonce-{F}(V1), P_generate_expiration_time-{F}(V1,V0), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_generate_b_nonce-{F}(V1,V3), P_encrypt-{F}(V3,V1,V0) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #412: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V45, V36 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V49, V20 == V27, V27 == V34, V34 == V41, V41 == V53, V19 == V26, V26 == V33, V33 == V40, V40 == V52; #371 ), references = 2, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V12,V0,V11), P_key-{F}(V9,V4,V13), P_key-{F}(V10,V3,V14), P_key-{F}(V15,V3,V11), P_key-{F}(V15,V4,V16), P_key-{F}(V12,V1,V16), P_generate_expiration_time-{F}(V17,V1), P_pair-{F}(V1,V17,V6), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V12,V6), P_pair-{F}(V1,V19,V6), P_pair-{F}(V20,V12,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #459: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V44, V37 == V45, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V46, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V47, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V48, V20 == V27, V27 == V34, V34 == V42, V42 == V54, V19 == V26, V26 == V33, V33 == V41, V41 == V53; #420 ), references = 1, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V1), P_pair-{F}(V3,V5,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V9,V2,V10), P_key-{F}(V11,V0,V10), P_pair-{F}(V12,V11,V1), P_triple-{F}(V11,V11,V11,V13), P_key-{F}(V8,V4,V14), P_key-{F}(V9,V3,V15), P_key-{F}(V16,V3,V10), P_key-{F}(V16,V4,V17), P_key-{F}(V11,V1,V17), P_generate_expiration_time-{F}(V18,V1), P_pair-{F}(V1,V18,V1), P_generate_b_nonce-{F}(V18,V19), P_encrypt-{F}(V19,V11,V13) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #532: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V52, V44 == V53, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V54, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V55, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V56, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60; #484 ), references = 2, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V12,V0,V11), P_triple-{F}(V12,V12,V12,V13), P_key-{F}(V9,V4,V14), P_key-{F}(V10,V3,V15), P_key-{F}(V16,V3,V11), P_key-{F}(V16,V4,V17), P_key-{F}(V12,V1,V17), P_generate_expiration_time-{F}(V18,V1), P_pair-{F}(V1,V18,V6), P_generate_b_nonce-{F}(V18,V19), P_encrypt-{F}(V19,V12,V13), P_pair-{F}(V1,V20,V6), P_pair-{F}(V21,V12,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #565: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V17, V17 == V21, V21 == V35, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V18, V18 == V22, V22 == V36, V7 == V10, V10 == V13, V13 == V16, V16 == V19, V19 == V23, V23 == V37, V25 == V26, V26 == V27, V27 == V28, V28 == V29, V29 == V41, V30 == V31, V31 == V32, V32 == V33, V33 == V34, V34 == V40, V38 == V43; #533 ), references = 1, size of lhs = 19:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_expiration_time-{F}(V3,V2), P_t-{F}(V4), P_at-{F}(V5), P_bt-{F}(V6), P_key-{F}(V6,V1,V7), P_key-{F}(V3,V0,V7), P_key-{F}(V3,V2,V7), P_triple-{F}(V3,V3,V3,V8), P_key-{F}(V5,V2,V9), P_key-{F}(V6,V2,V10), P_key-{F}(V11,V2,V7), P_generate_b_nonce-{F}(V3,V12), P_encrypt-{F}(V12,V3,V8) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #577: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V12, V12 == V13, V4 == V6, V6 == V0, V7 == V0; #566 ), references = 1, size of lhs = 11:
% 242.91/243.10     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V0), P_an_a_nonce-{F}(V1), P_generate_expiration_time-{F}(V1,V0), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_triple-{F}(V1,V1,V1,V3), P_generate_b_nonce-{F}(V1,V4), P_encrypt-{F}(V4,V1,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #624: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V45, V37 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V49, V20 == V27, V27 == V34, V34 == V42, V42 == V56, V19 == V26, V26 == V33, V33 == V41, V41 == V55; #585 ), references = 1, size of lhs = 27:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V2), P_pair-{F}(V4,V6,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V3,V11), P_key-{F}(V12,V0,V11), P_pair-{F}(V13,V12,V2), P_key-{F}(V14,V1,V11), P_encrypt-{F}(V12,V14,V15), P_key-{F}(V9,V5,V16), P_key-{F}(V10,V4,V17), P_key-{F}(V18,V4,V11), P_key-{F}(V18,V5,V19), P_key-{F}(V12,V2,V19), P_generate_expiration_time-{F}(V20,V2), P_pair-{F}(V2,V20,V2), P_generate_b_nonce-{F}(V20,V21), P_encrypt-{F}(V21,V12,V15) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #663: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V37, V29 == V38, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V39, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V40, V13 == V18, V18 == V25, V25 == V32, V32 == V41, V20 == V27, V27 == V34, V34 == V43, V19 == V26, V26 == V33, V33 == V42; #631 ), references = 3, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V3), P_an_a_nonce-{F}(V4), P_pair-{F}(V3,V4,V5), P_pair-{F}(V2,V4,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V8,V3,V10), P_key-{F}(V9,V2,V11), P_pair-{F}(V1,V12,V5), P_generate_expiration_time-{F}(V12,V13), P_generate_b_nonce-{F}(V12,V14), P_key-{F}(V15,V2,V16), P_key-{F}(V15,V3,V17), P_key-{F}(V18,V1,V17), P_triple-{F}(V1,V18,V13,V19), P_encrypt-{F}(V19,V9,V20), P_encrypt-{F}(V14,V18,V21), P_pair-{F}(V20,V21,V22), P_key-{F}(V22,V0,V16), P_pair-{F}(V23,V22,V5) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #702: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V37, V29 == V38, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V39, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V40, V13 == V18, V18 == V25, V25 == V32, V32 == V41, V20 == V27, V27 == V34, V34 == V43, V19 == V26, V26 == V33, V33 == V42; #670 ), references = 3, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V3), P_an_a_nonce-{F}(V4), P_pair-{F}(V3,V4,V5), P_pair-{F}(V2,V4,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V8,V3,V10), P_key-{F}(V9,V2,V11), P_pair-{F}(V1,V12,V5), P_generate_expiration_time-{F}(V12,V13), P_generate_b_nonce-{F}(V12,V14), P_key-{F}(V15,V0,V16), P_key-{F}(V17,V2,V16), P_key-{F}(V17,V3,V18), P_key-{F}(V19,V1,V18), P_triple-{F}(V1,V19,V13,V20), P_encrypt-{F}(V20,V9,V21), P_encrypt-{F}(V14,V19,V22), P_pair-{F}(V21,V22,V5), P_pair-{F}(V23,V15,V5) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #715: mergings( V0 == V13, V1 == V12, V4 == V14, V2 == V15, V5 == V16, V6 == V17, V7 == V18, V8 == V19, V9 == V20, V10 == V21; #704 ), references = 2, size of lhs = 24:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_pair-{F}(V2,V3,V4), P_pair-{F}(V1,V3,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V2,V9), P_key-{F}(V8,V1,V10), P_pair-{F}(V0,V11,V4), P_generate_expiration_time-{F}(V11,V12), P_generate_b_nonce-{F}(V11,V13), P_key-{F}(V14,V1,V15), P_key-{F}(V14,V2,V16), P_key-{F}(V17,V0,V16), P_triple-{F}(V0,V17,V12,V18), P_encrypt-{F}(V18,V8,V19), P_encrypt-{F}(V13,V17,V20), P_pair-{F}(V19,V20,V21), P_key-{F}(V21,V6,V15), P_pair-{F}(V22,V21,V4) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #728: mergings( V0 == V13, V1 == V12, V4 == V14, V2 == V15, V5 == V16, V6 == V17, V7 == V18, V8 == V19, V9 == V20, V10 == V21; #717 ), references = 2, size of lhs = 24:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_pair-{F}(V2,V3,V4), P_pair-{F}(V1,V3,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V2,V9), P_key-{F}(V8,V1,V10), P_pair-{F}(V0,V11,V4), P_generate_expiration_time-{F}(V11,V12), P_generate_b_nonce-{F}(V11,V13), P_key-{F}(V14,V6,V15), P_key-{F}(V16,V1,V15), P_key-{F}(V16,V2,V17), P_key-{F}(V18,V0,V17), P_triple-{F}(V0,V18,V12,V19), P_encrypt-{F}(V19,V8,V20), P_encrypt-{F}(V13,V18,V21), P_pair-{F}(V20,V21,V4), P_pair-{F}(V22,V14,V4) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #799: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V53, V44 == V54, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V55, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V56, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V57, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V63, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V62; #751 ), references = 3, size of lhs = 28:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_pair-{F}(V4,V6,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V11,V3,V12), P_key-{F}(V13,V0,V12), P_key-{F}(V14,V1,V12), P_encrypt-{F}(V13,V14,V15), P_key-{F}(V10,V5,V16), P_key-{F}(V11,V4,V17), P_key-{F}(V18,V4,V12), P_key-{F}(V18,V5,V19), P_key-{F}(V13,V2,V19), P_generate_expiration_time-{F}(V20,V2), P_pair-{F}(V2,V20,V7), P_generate_b_nonce-{F}(V20,V21), P_encrypt-{F}(V21,V13,V15), P_pair-{F}(V2,V22,V7), P_pair-{F}(V23,V13,V7) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #832: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V17, V17 == V21, V21 == V36, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V18, V18 == V22, V22 == V37, V7 == V10, V10 == V13, V13 == V16, V16 == V19, V19 == V23, V23 == V38, V26 == V27, V27 == V28, V28 == V29, V29 == V30, V30 == V43, V31 == V32, V32 == V33, V33 == V34, V34 == V35, V35 == V42, V39 == V45; #800 ), references = 2, size of lhs = 21:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V3), P_an_a_nonce-{F}(V4), P_generate_expiration_time-{F}(V4,V3), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V7,V2,V8), P_key-{F}(V4,V0,V8), P_key-{F}(V4,V3,V8), P_key-{F}(V9,V1,V8), P_encrypt-{F}(V4,V9,V10), P_key-{F}(V6,V3,V11), P_key-{F}(V7,V3,V12), P_key-{F}(V13,V3,V8), P_generate_b_nonce-{F}(V4,V14), P_encrypt-{F}(V14,V4,V10) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #844: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V12, V12 == V13, V4 == V6, V6 == V0, V7 == V0; #833 ), references = 1, size of lhs = 11:
% 242.91/243.10     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V0), P_an_a_nonce-{F}(V1), P_generate_expiration_time-{F}(V1,V0), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_encrypt-{F}(V1,V1,V3), P_generate_b_nonce-{F}(V1,V4), P_encrypt-{F}(V4,V1,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #856: mergings( V2 == V4, V4 == V7, V7 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V13, V3 == V5, V5 == V0, V6 == V0; #845 ), references = 1, size of lhs = 9:
% 242.91/243.10     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V0), P_an_a_nonce-{F}(V1), P_generate_expiration_time-{F}(V1,V0), P_at-{F}(V1), P_bt-{F}(V1), P_generate_b_nonce-{F}(V1,V1), P_t-{F}(V2) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #870: mergings( V0 == V12, V1 == V11, V4 == V13, V2 == V14, V5 == V15, V6 == V16, V7 == V17, V8 == V18, V9 == V23, V10 == V24, V19 == V26; #858 ), references = 1, size of lhs = 23:
% 242.91/243.10     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_pair-{F}(V0,V2,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V7,V5,V8), P_key-{F}(V9,V5,V8), P_key-{F}(V6,V1,V10), P_key-{F}(V7,V0,V11), P_key-{F}(V12,V0,V8), P_key-{F}(V12,V1,V8), P_key-{F}(V13,V5,V8), P_encrypt-{F}(V13,V9,V14), P_generate_expiration_time-{F}(V15,V5), P_pair-{F}(V5,V15,V3), P_generate_b_nonce-{F}(V15,V16), P_encrypt-{F}(V16,V13,V14), P_pair-{F}(V5,V17,V3), P_pair-{F}(V18,V13,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #933: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V45, V36 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V49, V20 == V27, V27 == V34, V34 == V41, V41 == V53, V19 == V26, V26 == V33, V33 == V40, V40 == V52; #892 ), references = 2, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V12,V0,V11), P_key-{F}(V9,V4,V13), P_key-{F}(V10,V3,V14), P_key-{F}(V15,V3,V11), P_key-{F}(V15,V4,V16), P_key-{F}(V12,V1,V16), P_pair-{F}(V1,V17,V6), P_generate_expiration_time-{F}(V17,V6), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V12,V1), P_pair-{F}(V1,V19,V6), P_pair-{F}(V20,V12,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #980: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V44, V37 == V45, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V46, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V47, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V48, V20 == V27, V27 == V34, V34 == V42, V42 == V54, V19 == V26, V26 == V33, V33 == V41, V41 == V53; #941 ), references = 1, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V1), P_pair-{F}(V3,V5,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V9,V2,V10), P_key-{F}(V11,V0,V10), P_pair-{F}(V12,V11,V1), P_pair-{F}(V11,V11,V13), P_key-{F}(V8,V4,V14), P_key-{F}(V9,V3,V15), P_key-{F}(V16,V3,V10), P_key-{F}(V16,V4,V17), P_key-{F}(V11,V1,V17), P_generate_expiration_time-{F}(V18,V13), P_pair-{F}(V1,V18,V1), P_generate_b_nonce-{F}(V18,V19), P_encrypt-{F}(V19,V11,V1) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1043: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V52, V44 == V53, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V54, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V55, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V56, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60; #996 ), references = 2, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V12,V0,V11), P_pair-{F}(V12,V12,V13), P_key-{F}(V9,V4,V14), P_key-{F}(V10,V3,V15), P_key-{F}(V16,V3,V11), P_key-{F}(V16,V4,V17), P_key-{F}(V12,V1,V17), P_generate_expiration_time-{F}(V18,V13), P_pair-{F}(V1,V18,V6), P_generate_b_nonce-{F}(V18,V19), P_encrypt-{F}(V19,V12,V1), P_pair-{F}(V1,V20,V6), P_pair-{F}(V21,V12,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1076: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V17, V17 == V21, V21 == V35, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V18, V18 == V22, V22 == V36, V7 == V10, V10 == V13, V13 == V16, V16 == V19, V19 == V23, V23 == V37, V25 == V26, V26 == V27, V27 == V28, V28 == V29, V29 == V41, V30 == V31, V31 == V32, V32 == V33, V33 == V34, V34 == V40, V38 == V43; #1044 ), references = 1, size of lhs = 19:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_t-{F}(V4), P_at-{F}(V5), P_bt-{F}(V6), P_key-{F}(V6,V1,V7), P_key-{F}(V3,V0,V7), P_key-{F}(V3,V2,V7), P_pair-{F}(V3,V3,V8), P_generate_expiration_time-{F}(V3,V8), P_key-{F}(V5,V2,V9), P_key-{F}(V6,V2,V10), P_key-{F}(V11,V2,V7), P_generate_b_nonce-{F}(V3,V12), P_encrypt-{F}(V12,V3,V2) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1088: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V12, V12 == V13, V4 == V6, V6 == V0, V7 == V0; #1077 ), references = 1, size of lhs = 11:
% 242.91/243.10     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_pair-{F}(V1,V1,V3), P_generate_expiration_time-{F}(V1,V3), P_generate_b_nonce-{F}(V1,V4), P_encrypt-{F}(V4,V1,V0) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1135: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V44, V37 == V45, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V46, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V47, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V48, V20 == V27, V27 == V34, V34 == V42, V42 == V51, V19 == V26, V26 == V33, V33 == V41, V41 == V50; #1096 ), references = 1, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V1), P_pair-{F}(V3,V5,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V9,V2,V10), P_key-{F}(V8,V4,V11), P_key-{F}(V9,V3,V12), P_key-{F}(V13,V3,V10), P_key-{F}(V13,V4,V14), P_pair-{F}(V1,V15,V1), P_generate_expiration_time-{F}(V15,V16), P_generate_b_nonce-{F}(V15,V17), P_encrypt-{F}(V17,V18,V18), P_key-{F}(V18,V0,V10), P_key-{F}(V18,V1,V14), P_pair-{F}(V18,V18,V16), P_pair-{F}(V19,V18,V1) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1182: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V45, V37 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V49, V20 == V27, V27 == V34, V34 == V42, V42 == V52, V19 == V26, V26 == V33, V33 == V41, V41 == V51; #1143 ), references = 2, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V6,V0,V11), P_key-{F}(V9,V4,V12), P_key-{F}(V10,V3,V13), P_key-{F}(V14,V3,V11), P_key-{F}(V14,V4,V15), P_key-{F}(V6,V1,V15), P_pair-{F}(V6,V6,V16), P_generate_expiration_time-{F}(V17,V16), P_pair-{F}(V1,V17,V6), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V6,V6), P_pair-{F}(V1,V19,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1195: mergings( V0 == V13, V1 == V12, V4 == V14, V2 == V15, V5 == V16, V6 == V17, V7 == V18, V8 == V19, V9 == V20, V10 == V21; #1184 ), references = 1, size of lhs = 24:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_pair-{F}(V2,V3,V4), P_pair-{F}(V1,V3,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V2,V9), P_key-{F}(V8,V1,V10), P_pair-{F}(V6,V11,V4), P_generate_expiration_time-{F}(V11,V12), P_generate_b_nonce-{F}(V11,V13), P_key-{F}(V14,V1,V15), P_key-{F}(V14,V2,V16), P_key-{F}(V17,V6,V16), P_triple-{F}(V6,V17,V12,V18), P_encrypt-{F}(V18,V8,V19), P_encrypt-{F}(V13,V17,V20), P_pair-{F}(V19,V20,V21), P_key-{F}(V21,V0,V15), P_pair-{F}(V22,V21,V4) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1264: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V52, V44 == V53, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V54, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V55, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V56, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V58; #1216 ), references = 2, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V9,V4,V12), P_key-{F}(V10,V3,V13), P_key-{F}(V14,V3,V11), P_key-{F}(V14,V4,V15), P_pair-{F}(V1,V16,V6), P_generate_expiration_time-{F}(V16,V17), P_generate_b_nonce-{F}(V16,V18), P_encrypt-{F}(V18,V19,V19), P_key-{F}(V19,V0,V11), P_key-{F}(V19,V1,V15), P_pair-{F}(V19,V19,V17), P_pair-{F}(V1,V20,V6), P_pair-{F}(V21,V19,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1297: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V17, V17 == V21, V21 == V35, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V18, V18 == V22, V22 == V36, V7 == V10, V10 == V13, V13 == V16, V16 == V19, V19 == V23, V23 == V37, V25 == V26, V26 == V27, V27 == V28, V28 == V29, V29 == V40, V30 == V31, V31 == V32, V32 == V33, V33 == V34, V34 == V39, V38 == V42; #1265 ), references = 1, size of lhs = 19:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_t-{F}(V4), P_at-{F}(V5), P_bt-{F}(V6), P_key-{F}(V6,V1,V7), P_key-{F}(V3,V0,V7), P_key-{F}(V3,V2,V7), P_key-{F}(V5,V2,V8), P_key-{F}(V6,V2,V9), P_key-{F}(V10,V2,V7), P_generate_expiration_time-{F}(V3,V11), P_pair-{F}(V3,V3,V11), P_generate_b_nonce-{F}(V3,V12), P_encrypt-{F}(V12,V3,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1309: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V12, V12 == V13, V4 == V6, V6 == V0, V7 == V0; #1298 ), references = 1, size of lhs = 11:
% 242.91/243.10     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_generate_expiration_time-{F}(V1,V3), P_pair-{F}(V1,V1,V3), P_generate_b_nonce-{F}(V1,V4), P_encrypt-{F}(V4,V1,V1) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1323: mergings( V0 == V13, V1 == V12, V4 == V14, V2 == V15, V5 == V16, V6 == V17, V7 == V18, V8 == V19, V9 == V22, V10 == V23, V20 == V25; #1311 ), references = 1, size of lhs = 22:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_pair-{F}(V2,V3,V4), P_pair-{F}(V1,V3,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V8,V0,V9), P_key-{F}(V7,V2,V10), P_key-{F}(V8,V1,V11), P_key-{F}(V12,V1,V9), P_key-{F}(V12,V2,V9), P_key-{F}(V13,V6,V9), P_pair-{F}(V6,V14,V4), P_generate_expiration_time-{F}(V14,V4), P_generate_b_nonce-{F}(V14,V15), P_encrypt-{F}(V15,V13,V6), P_pair-{F}(V6,V16,V4), P_pair-{F}(V17,V13,V4) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1340: mergings( V0 == V13, V1 == V12, V4 == V14, V2 == V15, V5 == V16, V6 == V17, V7 == V18, V8 == V19, V9 == V20, V10 == V21; #1327 ), references = 1, size of lhs = 24:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_pair-{F}(V2,V3,V4), P_pair-{F}(V1,V3,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V2,V9), P_key-{F}(V8,V1,V10), P_pair-{F}(V6,V11,V4), P_generate_expiration_time-{F}(V11,V12), P_generate_b_nonce-{F}(V11,V13), P_key-{F}(V14,V0,V15), P_key-{F}(V16,V1,V15), P_key-{F}(V16,V2,V17), P_key-{F}(V18,V6,V17), P_triple-{F}(V6,V18,V12,V19), P_encrypt-{F}(V19,V8,V20), P_encrypt-{F}(V13,V18,V21), P_pair-{F}(V20,V21,V4), P_pair-{F}(V22,V14,V4) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1351: mergings( V0 == V12, V1 == V11, V4 == V13, V2 == V14, V5 == V15, V6 == V16, V7 == V17, V8 == V18, V9 == V19, V10 == V20; #1328 ), references = 1, size of lhs = 23:
% 242.91/243.10     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_pair-{F}(V0,V2,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V6,V1,V8), P_key-{F}(V7,V0,V9), P_pair-{F}(V5,V10,V3), P_generate_expiration_time-{F}(V10,V11), P_generate_b_nonce-{F}(V10,V12), P_key-{F}(V13,V0,V14), P_key-{F}(V13,V1,V15), P_key-{F}(V16,V5,V15), P_triple-{F}(V5,V16,V11,V17), P_encrypt-{F}(V17,V7,V18), P_encrypt-{F}(V12,V16,V19), P_pair-{F}(V18,V19,V20), P_key-{F}(V20,V5,V14), P_pair-{F}(V21,V20,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1362: mergings( V0 == V12, V1 == V11, V4 == V13, V2 == V14, V5 == V15, V6 == V16, V7 == V17, V8 == V18, V9 == V19, V10 == V20; #1329 ), references = 1, size of lhs = 23:
% 242.91/243.10     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_pair-{F}(V0,V2,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V6,V1,V8), P_key-{F}(V7,V0,V9), P_pair-{F}(V5,V10,V3), P_generate_expiration_time-{F}(V10,V11), P_generate_b_nonce-{F}(V10,V12), P_key-{F}(V13,V5,V14), P_key-{F}(V15,V0,V14), P_key-{F}(V15,V1,V16), P_key-{F}(V17,V5,V16), P_triple-{F}(V5,V17,V11,V18), P_encrypt-{F}(V18,V7,V19), P_encrypt-{F}(V12,V17,V20), P_pair-{F}(V19,V20,V3), P_pair-{F}(V21,V13,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1417: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V53, V44 == V54, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V55, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V56, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V57, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60; #1371 ), references = 2, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_pair-{F}(V1,V1,V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_pair-{F}(V4,V6,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V11,V3,V12), P_key-{F}(V13,V0,V12), P_key-{F}(V10,V5,V14), P_key-{F}(V11,V4,V15), P_key-{F}(V16,V4,V12), P_key-{F}(V16,V5,V17), P_key-{F}(V13,V1,V17), P_pair-{F}(V1,V18,V7), P_generate_expiration_time-{F}(V18,V7), P_generate_b_nonce-{F}(V18,V19), P_encrypt-{F}(V19,V13,V2), P_pair-{F}(V1,V20,V7), P_pair-{F}(V21,V13,V7) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1472: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V43, V37 == V44, V43 == V52, V44 == V53, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V45, V45 == V54, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V46, V46 == V55, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V47, V47 == V56, V20 == V27, V27 == V34, V34 == V42, V42 == V49, V49 == V64, V19 == V26, V26 == V33, V33 == V41, V41 == V48, V48 == V63; #1426 ), references = 1, size of lhs = 28:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V2), P_pair-{F}(V4,V6,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V3,V11), P_key-{F}(V12,V0,V11), P_pair-{F}(V13,V12,V2), P_pair-{F}(V12,V12,V14), P_key-{F}(V15,V1,V11), P_encrypt-{F}(V12,V15,V16), P_key-{F}(V9,V5,V17), P_key-{F}(V10,V4,V18), P_key-{F}(V19,V4,V11), P_key-{F}(V19,V5,V20), P_key-{F}(V12,V2,V20), P_generate_expiration_time-{F}(V21,V14), P_pair-{F}(V2,V21,V2), P_generate_b_nonce-{F}(V21,V22), P_encrypt-{F}(V22,V12,V16) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1527: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V43, V37 == V44, V43 == V53, V44 == V54, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V45, V45 == V55, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V46, V46 == V56, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V47, V47 == V57, V20 == V27, V27 == V34, V34 == V42, V42 == V49, V49 == V61, V19 == V26, V26 == V33, V33 == V41, V41 == V48, V48 == V60; #1481 ), references = 2, size of lhs = 28:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_pair-{F}(V4,V6,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V11,V3,V12), P_key-{F}(V7,V0,V12), P_key-{F}(V13,V1,V12), P_key-{F}(V10,V5,V14), P_key-{F}(V11,V4,V15), P_key-{F}(V16,V4,V12), P_key-{F}(V16,V5,V17), P_key-{F}(V7,V2,V17), P_pair-{F}(V7,V7,V18), P_generate_expiration_time-{F}(V19,V18), P_pair-{F}(V2,V19,V7), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V7,V13,V21), P_encrypt-{F}(V20,V7,V21), P_pair-{F}(V2,V22,V7) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1598: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V52, V44 == V53, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V54, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V55, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V56, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V58; #1550 ), references = 2, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V9,V4,V12), P_key-{F}(V10,V3,V13), P_key-{F}(V14,V3,V11), P_key-{F}(V14,V4,V15), P_pair-{F}(V1,V16,V6), P_generate_expiration_time-{F}(V16,V17), P_key-{F}(V17,V1,V15), P_generate_b_nonce-{F}(V16,V18), P_encrypt-{F}(V18,V17,V19), P_key-{F}(V19,V0,V11), P_pair-{F}(V19,V19,V17), P_pair-{F}(V1,V20,V6), P_pair-{F}(V21,V19,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1615: mergings( V0 == V13, V1 == V12, V4 == V14, V2 == V15, V5 == V16, V6 == V17, V7 == V18, V8 == V19, V9 == V21, V10 == V22; #1602 ), references = 1, size of lhs = 24:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_pair-{F}(V2,V3,V4), P_pair-{F}(V1,V3,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V8,V6,V9), P_key-{F}(V7,V2,V10), P_key-{F}(V8,V1,V11), P_key-{F}(V12,V1,V9), P_key-{F}(V12,V2,V13), P_pair-{F}(V0,V14,V4), P_generate_expiration_time-{F}(V14,V15), P_key-{F}(V15,V0,V13), P_generate_b_nonce-{F}(V14,V16), P_encrypt-{F}(V16,V15,V17), P_key-{F}(V17,V6,V9), P_pair-{F}(V17,V17,V15), P_pair-{F}(V0,V18,V4), P_pair-{F}(V19,V17,V4) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1694: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V50, V44 == V51, V50 == V60, V51 == V61, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V52, V52 == V62, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V53, V53 == V63, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V54, V54 == V64, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V56, V56 == V71, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V55, V55 == V70; #1639 ), references = 1, size of lhs = 29:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_pair-{F}(V4,V6,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V11,V3,V12), P_key-{F}(V13,V0,V12), P_pair-{F}(V13,V13,V14), P_key-{F}(V15,V1,V12), P_encrypt-{F}(V13,V15,V16), P_key-{F}(V10,V5,V17), P_key-{F}(V11,V4,V18), P_key-{F}(V19,V4,V12), P_key-{F}(V19,V5,V20), P_key-{F}(V13,V2,V20), P_generate_expiration_time-{F}(V21,V14), P_pair-{F}(V2,V21,V7), P_generate_b_nonce-{F}(V21,V22), P_encrypt-{F}(V22,V13,V16), P_pair-{F}(V2,V23,V7), P_pair-{F}(V24,V13,V7) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1732: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V17, V17 == V21, V21 == V24, V24 == V41, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V18, V18 == V22, V22 == V25, V25 == V42, V7 == V10, V10 == V13, V13 == V16, V16 == V19, V19 == V23, V23 == V26, V26 == V43, V29 == V30, V30 == V31, V31 == V32, V32 == V33, V33 == V34, V34 == V49, V35 == V36, V36 == V37, V37 == V38, V38 == V39, V39 == V40, V40 == V48, V44 == V51; #1695 ), references = 1, size of lhs = 22:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V3), P_an_a_nonce-{F}(V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V7,V2,V8), P_key-{F}(V4,V0,V8), P_key-{F}(V4,V3,V8), P_pair-{F}(V4,V4,V9), P_generate_expiration_time-{F}(V4,V9), P_key-{F}(V10,V1,V8), P_encrypt-{F}(V4,V10,V11), P_key-{F}(V6,V3,V12), P_key-{F}(V7,V3,V13), P_key-{F}(V14,V3,V8), P_generate_b_nonce-{F}(V4,V15), P_encrypt-{F}(V15,V4,V11) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1745: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V12, V12 == V13, V13 == V14, V4 == V6, V6 == V0, V7 == V0; #1733 ), references = 1, size of lhs = 12:
% 242.91/243.10     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_pair-{F}(V1,V1,V3), P_generate_expiration_time-{F}(V1,V3), P_encrypt-{F}(V1,V1,V4), P_generate_b_nonce-{F}(V1,V5), P_encrypt-{F}(V5,V1,V4) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1758: mergings( V2 == V4, V4 == V7, V7 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V12, V12 == V14, V3 == V5, V5 == V0, V6 == V0; #1746 ), references = 1, size of lhs = 10:
% 242.91/243.10     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_generate_b_nonce-{F}(V1,V1), P_t-{F}(V2), P_pair-{F}(V1,V1,V3), P_generate_expiration_time-{F}(V1,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1773: mergings( V0 == V14, V1 == V13, V4 == V15, V2 == V16, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V9 == V22, V10 == V23; #1761 ), references = 1, size of lhs = 24:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V3), P_an_a_nonce-{F}(V4), P_pair-{F}(V3,V4,V5), P_pair-{F}(V2,V4,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V9,V7,V10), P_key-{F}(V5,V0,V10), P_key-{F}(V8,V3,V11), P_key-{F}(V9,V2,V12), P_key-{F}(V13,V2,V10), P_key-{F}(V13,V3,V14), P_key-{F}(V5,V1,V14), P_pair-{F}(V5,V5,V15), P_generate_expiration_time-{F}(V16,V15), P_pair-{F}(V1,V16,V5), P_generate_b_nonce-{F}(V16,V17), P_encrypt-{F}(V17,V5,V5), P_pair-{F}(V1,V18,V5) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1784: mergings( V0 == V15, V1 == V14, V4 == V16, V2 == V17, V5 == V18, V6 == V19, V7 == V20, V8 == V21, V9 == V24, V10 == V25; #1762 ), references = 1, size of lhs = 27:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V8,V11), P_key-{F}(V6,V0,V11), P_key-{F}(V12,V1,V11), P_key-{F}(V9,V4,V13), P_key-{F}(V10,V3,V14), P_key-{F}(V15,V3,V11), P_key-{F}(V15,V4,V16), P_key-{F}(V6,V2,V16), P_pair-{F}(V6,V6,V17), P_generate_expiration_time-{F}(V18,V17), P_pair-{F}(V2,V18,V6), P_generate_b_nonce-{F}(V18,V19), P_encrypt-{F}(V6,V12,V20), P_encrypt-{F}(V19,V6,V20), P_pair-{F}(V2,V21,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1831: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V44, V37 == V45, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V46, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V47, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V48, V20 == V27, V27 == V34, V34 == V42, V42 == V51, V19 == V26, V26 == V33, V33 == V41, V41 == V50; #1792 ), references = 1, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V1), P_pair-{F}(V3,V5,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V9,V2,V10), P_key-{F}(V8,V4,V11), P_key-{F}(V9,V3,V12), P_key-{F}(V13,V3,V10), P_key-{F}(V13,V4,V14), P_pair-{F}(V1,V15,V1), P_generate_expiration_time-{F}(V15,V16), P_generate_b_nonce-{F}(V15,V17), P_encrypt-{F}(V17,V18,V18), P_key-{F}(V18,V0,V10), P_key-{F}(V18,V1,V14), P_pair-{F}(V18,V1,V16), P_pair-{F}(V19,V18,V1) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1878: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V45, V37 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V49, V20 == V27, V27 == V34, V34 == V42, V42 == V52, V19 == V26, V26 == V33, V33 == V41, V41 == V51; #1839 ), references = 1, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V6,V0,V11), P_key-{F}(V9,V4,V12), P_key-{F}(V10,V3,V13), P_key-{F}(V14,V3,V11), P_key-{F}(V14,V4,V15), P_key-{F}(V6,V1,V15), P_pair-{F}(V6,V1,V16), P_generate_expiration_time-{F}(V17,V16), P_pair-{F}(V1,V17,V6), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V6,V6), P_pair-{F}(V1,V19,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1948: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V52, V44 == V53, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V54, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V55, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V56, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V58; #1900 ), references = 2, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V9,V4,V12), P_key-{F}(V10,V3,V13), P_key-{F}(V14,V3,V11), P_key-{F}(V14,V4,V15), P_pair-{F}(V1,V16,V6), P_generate_expiration_time-{F}(V16,V17), P_generate_b_nonce-{F}(V16,V18), P_encrypt-{F}(V18,V19,V19), P_key-{F}(V19,V0,V11), P_key-{F}(V19,V1,V15), P_pair-{F}(V19,V1,V17), P_pair-{F}(V1,V20,V6), P_pair-{F}(V21,V19,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1981: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V17, V17 == V21, V21 == V35, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V18, V18 == V22, V22 == V36, V7 == V10, V10 == V13, V13 == V16, V16 == V19, V19 == V23, V23 == V37, V25 == V26, V26 == V27, V27 == V28, V28 == V29, V29 == V40, V30 == V31, V31 == V32, V32 == V33, V33 == V34, V34 == V39, V38 == V42; #1949 ), references = 1, size of lhs = 19:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_t-{F}(V4), P_at-{F}(V5), P_bt-{F}(V6), P_key-{F}(V6,V1,V7), P_key-{F}(V3,V0,V7), P_key-{F}(V3,V2,V7), P_key-{F}(V5,V2,V8), P_key-{F}(V6,V2,V9), P_key-{F}(V10,V2,V7), P_generate_expiration_time-{F}(V3,V11), P_pair-{F}(V3,V2,V11), P_generate_b_nonce-{F}(V3,V12), P_encrypt-{F}(V12,V3,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #1993: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V12, V12 == V13, V4 == V6, V6 == V0, V7 == V0; #1982 ), references = 1, size of lhs = 11:
% 242.91/243.10     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_generate_expiration_time-{F}(V1,V3), P_pair-{F}(V1,V0,V3), P_generate_b_nonce-{F}(V1,V4), P_encrypt-{F}(V4,V1,V1) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #2048: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V44, V37 == V45, V44 == V57, V45 == V58, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V46, V46 == V59, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V47, V47 == V60, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V48, V48 == V61, V20 == V27, V27 == V34, V34 == V42, V42 == V50, V50 == V64, V19 == V26, V26 == V33, V33 == V41, V41 == V49, V49 == V63; #2002 ), references = 2, size of lhs = 29:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_key-{F}(V3,V1,V4), P_key-{F}(V5,V2,V4), P_encrypt-{F}(V3,V5,V6), party_of_protocol-{F}(V7), party_of_protocol-{F}(V8), P_b-{F}(V8), P_a-{F}(V9), P_an_a_nonce-{F}(V10), P_pair-{F}(V9,V10,V11), P_pair-{F}(V8,V10,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V15,V7,V16), P_key-{F}(V11,V0,V16), P_key-{F}(V14,V9,V17), P_key-{F}(V15,V8,V18), P_key-{F}(V19,V8,V16), P_key-{F}(V19,V9,V20), P_key-{F}(V11,V3,V20), P_generate_expiration_time-{F}(V21,V6), P_pair-{F}(V3,V21,V11), P_generate_b_nonce-{F}(V21,V22), P_encrypt-{F}(V22,V11,V11), P_pair-{F}(V3,V23,V11) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #2095: mergings( V3 == V4, V4 == V7, V35 == V36, V7 == V11, V36 == V37, V11 == V15, V37 == V39, V15 == V19, V39 == V41, V19 == V24, V41 == V43, V24 == V28, V43 == V45, V28 == V54, V45 == V55, V5 == V8, V8 == V12, V12 == V16, V16 == V20, V20 == V25, V25 == V29, V29 == V56, V6 == V9, V9 == V13, V13 == V17, V17 == V21, V21 == V26, V26 == V30, V30 == V57, V10 == V14, V14 == V18, V18 == V22, V22 == V27, V27 == V31, V31 == V58, V38 == V40, V40 == V42, V42 == V44, V44 == V46, V46 == V61, V49 == V50, V50 == V51, V51 == V52, V52 == V53, V53 == V60; #2049 ), references = 2, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_encrypt-{F}(V2,V2,V3), party_of_protocol-{F}(V4), party_of_protocol-{F}(V5), P_b-{F}(V5), P_a-{F}(V6), P_an_a_nonce-{F}(V7), P_pair-{F}(V6,V7,V8), P_pair-{F}(V5,V7,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V12,V4,V13), P_key-{F}(V8,V0,V13), P_key-{F}(V11,V6,V14), P_key-{F}(V12,V5,V15), P_key-{F}(V16,V5,V13), P_key-{F}(V16,V6,V17), P_key-{F}(V8,V2,V17), P_generate_expiration_time-{F}(V18,V3), P_pair-{F}(V2,V18,V8), P_generate_b_nonce-{F}(V18,V19), P_encrypt-{F}(V19,V8,V8), P_pair-{F}(V2,V20,V8) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #2142: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V45, V37 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V49, V20 == V27, V27 == V34, V34 == V42, V42 == V52, V19 == V26, V26 == V33, V33 == V41, V41 == V51; #2103 ), references = 1, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V6,V0,V11), P_key-{F}(V9,V4,V12), P_key-{F}(V10,V3,V13), P_key-{F}(V14,V3,V11), P_key-{F}(V14,V4,V15), P_key-{F}(V6,V1,V15), P_triple-{F}(V6,V6,V1,V16), P_generate_expiration_time-{F}(V17,V16), P_pair-{F}(V1,V17,V6), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V6,V6), P_pair-{F}(V1,V19,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #2189: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V45, V37 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V49, V20 == V27, V27 == V34, V34 == V42, V42 == V52, V19 == V26, V26 == V33, V33 == V41, V41 == V51; #2150 ), references = 1, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V6,V0,V11), P_key-{F}(V9,V4,V12), P_key-{F}(V10,V3,V13), P_key-{F}(V14,V3,V11), P_key-{F}(V14,V4,V15), P_key-{F}(V6,V1,V15), P_triple-{F}(V6,V1,V1,V16), P_generate_expiration_time-{F}(V17,V16), P_pair-{F}(V1,V17,V6), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V6,V6), P_pair-{F}(V1,V19,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #2236: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V45, V37 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V49, V20 == V27, V27 == V34, V34 == V42, V42 == V52, V19 == V26, V26 == V33, V33 == V41, V41 == V51; #2197 ), references = 1, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V6,V0,V11), P_key-{F}(V9,V4,V12), P_key-{F}(V10,V3,V13), P_key-{F}(V14,V3,V11), P_key-{F}(V14,V4,V15), P_key-{F}(V6,V1,V15), P_triple-{F}(V6,V1,V6,V16), P_generate_expiration_time-{F}(V17,V16), P_pair-{F}(V1,V17,V6), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V6,V6), P_pair-{F}(V1,V19,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #2283: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V45, V37 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V49, V20 == V27, V27 == V34, V34 == V42, V42 == V52, V19 == V26, V26 == V33, V33 == V41, V41 == V51; #2244 ), references = 1, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V6,V0,V11), P_key-{F}(V9,V4,V12), P_key-{F}(V10,V3,V13), P_key-{F}(V14,V3,V11), P_key-{F}(V14,V4,V15), P_key-{F}(V6,V1,V15), P_triple-{F}(V1,V6,V6,V16), P_generate_expiration_time-{F}(V17,V16), P_pair-{F}(V1,V17,V6), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V6,V6), P_pair-{F}(V1,V19,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #2330: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V45, V37 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V49, V20 == V27, V27 == V34, V34 == V42, V42 == V52, V19 == V26, V26 == V33, V33 == V41, V41 == V51; #2291 ), references = 1, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V6,V0,V11), P_key-{F}(V9,V4,V12), P_key-{F}(V10,V3,V13), P_key-{F}(V14,V3,V11), P_key-{F}(V14,V4,V15), P_key-{F}(V6,V1,V15), P_quadruple-{F}(V6,V6,V6,V1,V16), P_generate_expiration_time-{F}(V17,V16), P_pair-{F}(V1,V17,V6), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V6,V6), P_pair-{F}(V1,V19,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #2791: mergings( V4 == V15, V15 == V26, V26 == V41, V0 == V16, V16 == V27, V27 == V39, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V28, V18 == V29, V19 == V30, V20 == V31, V28 == V42, V29 == V43, V30 == V44, V31 == V45, V1 == V21, V21 == V32, V32 == V46, V9 == V22, V22 == V33, V33 == V47, V10 == V23, V23 == V34, V34 == V48, V24 == V35, V25 == V36, V35 == V49, V36 == V50; #2757 ), references = 1, size of lhs = 35:
% 242.91/243.10     fresh_to_b-{F}(V0), P_generate_b_nonce-{F}(V0,V1), P_generate_expiration_time-{F}(V0,V2), message-{F}(V3), intruder_message-{F}(V4), party_of_protocol-{F}(V5), party_of_protocol-{F}(V6), P_b-{F}(V6), b_stored-{F}(V7), P_a-{F}(V8), P_an_a_nonce-{F}(V9), P_pair-{F}(V8,V9,V10), P_sent-{F}(V8,V6,V10,V11), P_pair-{F}(V6,V9,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V8,V16), P_key-{F}(V15,V6,V17), intruder_holds-{F}(V18), P_key-{F}(V19,V6,V18), P_key-{F}(V19,V8,V20), P_key-{F}(V21,V5,V20), P_pair-{F}(V5,V22,V7), P_generate_expiration_time-{F}(V22,V23), P_triple-{F}(V5,V21,V23,V24), P_encrypt-{F}(V24,V15,V25), P_generate_b_nonce-{F}(V22,V26), P_encrypt-{F}(V26,V21,V4), P_triple-{F}(V27,V0,V2,V28), P_encrypt-{F}(V28,V15,V29), P_triple-{F}(V6,V1,V29,V30), P_pair-{F}(V27,V0,V31), P_sent-{F}(V27,V6,V31,V3), P_triple-{F}(V32,V33,V25,V30) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #2823: mergings( V4 == V15, V15 == V26, V26 == V41, V0 == V16, V16 == V27, V27 == V39, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V28, V18 == V29, V19 == V30, V20 == V31, V28 == V42, V29 == V43, V30 == V44, V31 == V45, V1 == V21, V21 == V32, V32 == V46, V9 == V22, V22 == V33, V33 == V47, V10 == V23, V23 == V34, V34 == V48, V24 == V35, V25 == V36, V35 == V49, V36 == V50; #2758 ), references = 1, size of lhs = 35:
% 242.91/243.10     fresh_to_b-{F}(V0), P_generate_b_nonce-{F}(V0,V1), P_generate_expiration_time-{F}(V0,V2), message-{F}(V3), intruder_message-{F}(V4), party_of_protocol-{F}(V5), party_of_protocol-{F}(V6), P_b-{F}(V6), b_stored-{F}(V7), P_a-{F}(V8), P_an_a_nonce-{F}(V9), P_pair-{F}(V8,V9,V10), P_sent-{F}(V8,V6,V10,V11), P_pair-{F}(V6,V9,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V8,V16), P_key-{F}(V15,V6,V17), intruder_holds-{F}(V18), P_key-{F}(V19,V6,V18), P_key-{F}(V19,V8,V20), P_key-{F}(V21,V5,V20), P_pair-{F}(V5,V22,V7), P_generate_expiration_time-{F}(V22,V23), P_triple-{F}(V5,V21,V23,V24), P_encrypt-{F}(V24,V15,V25), P_generate_b_nonce-{F}(V22,V26), P_encrypt-{F}(V26,V21,V4), P_triple-{F}(V27,V0,V2,V28), P_encrypt-{F}(V28,V15,V29), P_triple-{F}(V6,V1,V29,V30), P_pair-{F}(V27,V0,V31), P_sent-{F}(V27,V6,V31,V3), P_triple-{F}(V32,V33,V25,V30) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #2855: mergings( V4 == V15, V15 == V26, V26 == V43, V0 == V16, V16 == V27, V27 == V41, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V28, V18 == V29, V19 == V30, V20 == V31, V28 == V44, V29 == V45, V30 == V46, V31 == V47, V1 == V21, V21 == V32, V32 == V48, V9 == V22, V22 == V33, V33 == V49, V10 == V23, V23 == V34, V34 == V50, V24 == V35, V25 == V36, V35 == V51, V36 == V52; #2759 ), references = 1, size of lhs = 37:
% 242.91/243.10     fresh_to_b-{F}(V0), P_generate_b_nonce-{F}(V0,V1), P_generate_expiration_time-{F}(V0,V2), message-{F}(V3), intruder_holds-{F}(V4), party_of_protocol-{F}(V5), intruder_message-{F}(V6), party_of_protocol-{F}(V7), party_of_protocol-{F}(V8), P_b-{F}(V8), b_stored-{F}(V9), P_a-{F}(V10), P_an_a_nonce-{F}(V11), P_pair-{F}(V10,V11,V12), P_sent-{F}(V10,V8,V12,V13), P_pair-{F}(V8,V11,V14), P_t-{F}(V15), P_at-{F}(V16), P_bt-{F}(V17), P_key-{F}(V17,V5,V4), P_key-{F}(V16,V10,V18), P_key-{F}(V17,V8,V19), intruder_holds-{F}(V20), P_key-{F}(V21,V8,V20), P_key-{F}(V21,V10,V22), P_key-{F}(V23,V7,V22), P_pair-{F}(V7,V24,V9), P_generate_expiration_time-{F}(V24,V25), P_triple-{F}(V7,V23,V25,V26), P_generate_b_nonce-{F}(V24,V27), P_encrypt-{F}(V27,V23,V6), P_triple-{F}(V28,V0,V2,V29), P_encrypt-{F}(V29,V17,V30), P_triple-{F}(V8,V1,V30,V31), P_pair-{F}(V28,V0,V32), P_sent-{F}(V28,V8,V32,V3), P_triple-{F}(V33,V34,V26,V31) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #2890: mergings( V4 == V15, V15 == V26, V26 == V41, V0 == V16, V16 == V27, V27 == V39, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V28, V18 == V29, V19 == V30, V20 == V31, V28 == V42, V29 == V43, V30 == V44, V31 == V45, V9 == V21, V21 == V32, V32 == V46, V10 == V22, V22 == V33, V33 == V47, V11 == V23, V23 == V34, V34 == V48, V24 == V35, V25 == V36, V35 == V49, V36 == V50; #2856 ), references = 1, size of lhs = 33:
% 242.91/243.10     fresh_to_b-{F}(V0), P_generate_b_nonce-{F}(V0,V1), P_generate_expiration_time-{F}(V0,V2), message-{F}(V3), intruder_message-{F}(V4), party_of_protocol-{F}(V5), party_of_protocol-{F}(V6), P_b-{F}(V6), b_stored-{F}(V7), P_a-{F}(V8), P_an_a_nonce-{F}(V9), P_pair-{F}(V8,V9,V10), P_sent-{F}(V8,V6,V10,V11), P_pair-{F}(V6,V9,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V8,V16), P_key-{F}(V15,V6,V17), intruder_holds-{F}(V18), P_key-{F}(V19,V6,V18), P_key-{F}(V19,V8,V20), P_key-{F}(V21,V5,V20), P_pair-{F}(V5,V22,V7), P_generate_expiration_time-{F}(V22,V23), P_triple-{F}(V5,V21,V23,V24), P_encrypt-{F}(V24,V15,V25), P_generate_b_nonce-{F}(V22,V26), P_encrypt-{F}(V26,V21,V4), P_encrypt-{F}(V27,V15,V25), P_triple-{F}(V28,V0,V2,V27), P_pair-{F}(V28,V0,V29), P_sent-{F}(V28,V6,V29,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #2922: mergings( V4 == V15, V15 == V26, V26 == V41, V0 == V16, V16 == V27, V27 == V39, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V28, V18 == V29, V19 == V30, V20 == V31, V28 == V42, V29 == V43, V30 == V44, V31 == V45, V9 == V21, V21 == V32, V32 == V46, V10 == V22, V22 == V33, V33 == V47, V11 == V23, V23 == V34, V34 == V48, V24 == V35, V25 == V36, V35 == V49, V36 == V50; #2857 ), references = 1, size of lhs = 33:
% 242.91/243.10     fresh_to_b-{F}(V0), P_generate_b_nonce-{F}(V0,V1), P_generate_expiration_time-{F}(V0,V2), message-{F}(V3), intruder_message-{F}(V4), party_of_protocol-{F}(V5), party_of_protocol-{F}(V6), P_b-{F}(V6), b_stored-{F}(V7), P_a-{F}(V8), P_an_a_nonce-{F}(V9), P_pair-{F}(V8,V9,V10), P_sent-{F}(V8,V6,V10,V11), P_pair-{F}(V6,V9,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V8,V16), P_key-{F}(V15,V6,V17), intruder_holds-{F}(V18), P_key-{F}(V19,V6,V18), P_key-{F}(V19,V8,V20), P_key-{F}(V21,V5,V20), P_pair-{F}(V5,V22,V7), P_generate_expiration_time-{F}(V22,V23), P_triple-{F}(V5,V21,V23,V24), P_encrypt-{F}(V24,V15,V25), P_generate_b_nonce-{F}(V22,V26), P_encrypt-{F}(V26,V21,V4), P_encrypt-{F}(V27,V15,V25), P_triple-{F}(V28,V0,V2,V27), P_pair-{F}(V28,V0,V29), P_sent-{F}(V28,V6,V29,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #2954: mergings( V4 == V15, V15 == V26, V26 == V43, V0 == V16, V16 == V27, V27 == V41, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V28, V18 == V29, V19 == V30, V20 == V31, V28 == V44, V29 == V45, V30 == V46, V31 == V47, V9 == V21, V21 == V32, V32 == V48, V10 == V22, V22 == V33, V33 == V49, V11 == V23, V23 == V34, V34 == V50, V24 == V35, V25 == V36, V35 == V51, V36 == V52; #2858 ), references = 2, size of lhs = 35:
% 242.91/243.10     fresh_to_b-{F}(V0), P_generate_b_nonce-{F}(V0,V1), P_generate_expiration_time-{F}(V0,V2), message-{F}(V3), intruder_holds-{F}(V4), party_of_protocol-{F}(V5), intruder_message-{F}(V6), party_of_protocol-{F}(V7), party_of_protocol-{F}(V8), P_b-{F}(V8), b_stored-{F}(V9), P_a-{F}(V10), P_an_a_nonce-{F}(V11), P_pair-{F}(V10,V11,V12), P_sent-{F}(V10,V8,V12,V13), P_pair-{F}(V8,V11,V14), P_t-{F}(V15), P_at-{F}(V16), P_bt-{F}(V17), P_key-{F}(V17,V5,V4), P_key-{F}(V16,V10,V18), P_key-{F}(V17,V8,V19), intruder_holds-{F}(V20), P_key-{F}(V21,V8,V20), P_key-{F}(V21,V10,V22), P_key-{F}(V23,V7,V22), P_pair-{F}(V7,V24,V9), P_generate_expiration_time-{F}(V24,V25), P_triple-{F}(V7,V23,V25,V26), P_generate_b_nonce-{F}(V24,V27), P_encrypt-{F}(V27,V23,V6), P_encrypt-{F}(V28,V17,V26), P_triple-{F}(V29,V0,V2,V28), P_pair-{F}(V29,V0,V30), P_sent-{F}(V29,V8,V30,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #2987: mergings( V3 == V15, V15 == V26, V26 == V41, V4 == V16, V16 == V27, V27 == V39, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V28, V18 == V29, V19 == V30, V20 == V31, V28 == V42, V29 == V43, V30 == V44, V31 == V45, V9 == V21, V21 == V32, V32 == V46, V10 == V22, V22 == V33, V33 == V47, V23 == V34, V34 == V1, V24 == V35, V25 == V36, V35 == V48, V36 == V49; #2955 ), references = 2, size of lhs = 31:
% 242.91/243.10     fresh_to_b-{F}(V0), P_generate_b_nonce-{F}(V0,V1), P_generate_expiration_time-{F}(V0,V2), message-{F}(V3), intruder_message-{F}(V4), party_of_protocol-{F}(V5), party_of_protocol-{F}(V6), P_b-{F}(V6), b_stored-{F}(V7), P_a-{F}(V8), P_an_a_nonce-{F}(V9), P_pair-{F}(V8,V9,V10), P_sent-{F}(V8,V6,V10,V11), P_pair-{F}(V6,V9,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V8,V16), P_key-{F}(V15,V6,V17), intruder_holds-{F}(V18), P_key-{F}(V19,V6,V18), P_key-{F}(V19,V8,V20), P_key-{F}(V21,V5,V20), P_pair-{F}(V5,V22,V7), P_generate_expiration_time-{F}(V22,V23), P_triple-{F}(V5,V21,V23,V24), P_generate_b_nonce-{F}(V22,V25), P_encrypt-{F}(V25,V21,V4), P_triple-{F}(V26,V0,V2,V24), P_pair-{F}(V26,V0,V27), P_sent-{F}(V26,V6,V27,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3018: mergings( V3 == V15, V15 == V26, V26 == V41, V4 == V16, V16 == V27, V27 == V39, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V28, V18 == V29, V19 == V30, V20 == V31, V28 == V42, V29 == V43, V30 == V44, V31 == V45, V9 == V21, V21 == V32, V32 == V46, V10 == V22, V22 == V33, V33 == V47, V23 == V34, V34 == V1, V24 == V35, V25 == V36, V35 == V48, V36 == V49; #2956 ), references = 2, size of lhs = 31:
% 242.91/243.10     fresh_to_b-{F}(V0), P_generate_b_nonce-{F}(V0,V1), P_generate_expiration_time-{F}(V0,V2), message-{F}(V3), intruder_message-{F}(V4), party_of_protocol-{F}(V5), party_of_protocol-{F}(V6), P_b-{F}(V6), b_stored-{F}(V7), P_a-{F}(V8), P_an_a_nonce-{F}(V9), P_pair-{F}(V8,V9,V10), P_sent-{F}(V8,V6,V10,V11), P_pair-{F}(V6,V9,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V8,V16), P_key-{F}(V15,V6,V17), intruder_holds-{F}(V18), P_key-{F}(V19,V6,V18), P_key-{F}(V19,V8,V20), P_key-{F}(V21,V5,V20), P_pair-{F}(V5,V22,V7), P_generate_expiration_time-{F}(V22,V23), P_triple-{F}(V5,V21,V23,V24), P_generate_b_nonce-{F}(V22,V25), P_encrypt-{F}(V25,V21,V4), P_triple-{F}(V26,V0,V2,V24), P_pair-{F}(V26,V0,V27), P_sent-{F}(V26,V6,V27,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3051: mergings( V4 == V14, V14 == V25, V25 == V39, V5 == V15, V15 == V26, V26 == V37, V6 == V16, V7 == V17, V8 == V18, V9 == V19, V16 == V27, V17 == V28, V18 == V29, V19 == V30, V27 == V40, V28 == V41, V29 == V42, V30 == V43, V10 == V20, V20 == V31, V31 == V44, V11 == V21, V21 == V32, V32 == V45, V22 == V33, V33 == V46, V23 == V34, V24 == V35, V34 == V47, V35 == V48; #3019 ), references = 11, size of lhs = 29:
% 242.91/243.10     fresh_to_b-{F}(V0), P_generate_b_nonce-{F}(V0,V1), P_generate_expiration_time-{F}(V0,V2), message-{F}(V3), intruder_message-{F}(V4), party_of_protocol-{F}(V5), party_of_protocol-{F}(V6), P_b-{F}(V6), b_stored-{F}(V7), P_a-{F}(V8), P_an_a_nonce-{F}(V9), P_pair-{F}(V8,V9,V10), P_sent-{F}(V8,V6,V10,V11), P_pair-{F}(V6,V9,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V8,V16), P_key-{F}(V15,V6,V17), intruder_holds-{F}(V18), P_key-{F}(V19,V6,V18), P_key-{F}(V19,V8,V20), P_key-{F}(V0,V5,V20), P_pair-{F}(V5,V21,V7), P_generate_expiration_time-{F}(V21,V2), P_generate_b_nonce-{F}(V21,V22), P_encrypt-{F}(V22,V0,V4), P_pair-{F}(V5,V0,V23), P_sent-{F}(V5,V6,V23,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3082: mergings( V4 == V14, V14 == V25, V25 == V39, V5 == V15, V15 == V26, V26 == V37, V6 == V16, V7 == V17, V8 == V18, V9 == V19, V16 == V27, V17 == V28, V18 == V29, V19 == V30, V27 == V40, V28 == V41, V29 == V42, V30 == V43, V10 == V20, V20 == V31, V31 == V44, V11 == V21, V21 == V32, V32 == V45, V22 == V33, V33 == V46, V23 == V34, V24 == V35, V34 == V47, V35 == V48; #3020 ), references = 11, size of lhs = 29:
% 242.91/243.10     fresh_to_b-{F}(V0), P_generate_b_nonce-{F}(V0,V1), P_generate_expiration_time-{F}(V0,V2), message-{F}(V3), intruder_message-{F}(V4), party_of_protocol-{F}(V5), party_of_protocol-{F}(V6), P_b-{F}(V6), b_stored-{F}(V7), P_a-{F}(V8), P_an_a_nonce-{F}(V9), P_pair-{F}(V8,V9,V10), P_sent-{F}(V8,V6,V10,V11), P_pair-{F}(V6,V9,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V8,V16), P_key-{F}(V15,V6,V17), intruder_holds-{F}(V18), P_key-{F}(V19,V6,V18), P_key-{F}(V19,V8,V20), P_key-{F}(V0,V5,V20), P_pair-{F}(V5,V21,V7), P_generate_expiration_time-{F}(V21,V2), P_generate_b_nonce-{F}(V21,V22), P_encrypt-{F}(V22,V0,V4), P_pair-{F}(V5,V0,V23), P_sent-{F}(V5,V6,V23,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3155: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V16, V10 == V17, V16 == V23, V17 == V24, V23 == V31, V24 == V32, V31 == V38, V32 == V39, V38 == V43, V39 == V44, V43 == V49, V44 == V50, V49 == V56, V50 == V57, V56 == V63, V57 == V64, V7 == V11, V11 == V18, V18 == V25, V25 == V33, V33 == V40, V40 == V45, V45 == V51, V51 == V58, V58 == V65, V8 == V12, V12 == V19, V19 == V26, V26 == V34, V34 == V41, V41 == V46, V46 == V52, V52 == V59, V59 == V66, V13 == V20, V20 == V27, V27 == V35, V35 == V42, V42 == V53, V53 == V60, V60 == V67, V15 == V22, V22 == V29, V29 == V37, V37 == V55, V55 == V62, V62 == V69, V14 == V21, V21 == V28, V28 == V36, V36 == V54, V54 == V61, V61 == V68; #3097 ), references = 1, size of lhs = 27:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), P_pair-{F}(V2,V3,V6), P_pair-{F}(V1,V3,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V9,V2,V11), P_key-{F}(V10,V1,V12), P_key-{F}(V3,V8,V13), P_key-{F}(V14,V2,V13), P_key-{F}(V14,V1,V15), P_key-{F}(V6,V0,V15), P_generate_expiration_time-{F}(V16,V5), P_pair-{F}(V8,V16,V17), P_pair-{F}(V18,V3,V17), P_sent-{F}(V18,V1,V17,V19), P_sent-{F}(V8,V8,V6,V19), P_generate_b_nonce-{F}(V16,V20), P_encrypt-{F}(V20,V3,V6), P_pair-{F}(V8,V3,V21), P_sent-{F}(V8,V1,V21,V19) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3212: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V16, V10 == V17, V16 == V23, V17 == V24, V23 == V31, V24 == V32, V31 == V38, V32 == V39, V38 == V43, V39 == V44, V43 == V49, V44 == V50, V49 == V56, V50 == V57, V56 == V63, V57 == V64, V7 == V11, V11 == V18, V18 == V25, V25 == V33, V33 == V40, V40 == V45, V45 == V51, V51 == V58, V58 == V65, V8 == V12, V12 == V19, V19 == V26, V26 == V34, V34 == V41, V41 == V46, V46 == V52, V52 == V59, V59 == V66, V13 == V20, V20 == V27, V27 == V35, V35 == V42, V42 == V53, V53 == V60, V60 == V67, V15 == V22, V22 == V29, V29 == V37, V37 == V55, V55 == V62, V62 == V69, V14 == V21, V21 == V28, V28 == V36, V36 == V54, V54 == V61, V61 == V68; #3098 ), references = 1, size of lhs = 27:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), P_pair-{F}(V2,V3,V6), P_pair-{F}(V1,V3,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V9,V2,V11), P_key-{F}(V10,V1,V12), P_key-{F}(V3,V8,V13), P_key-{F}(V14,V2,V13), P_key-{F}(V14,V1,V15), P_key-{F}(V6,V0,V15), P_generate_expiration_time-{F}(V16,V5), P_pair-{F}(V8,V16,V17), P_pair-{F}(V18,V3,V17), P_sent-{F}(V18,V1,V17,V19), P_sent-{F}(V8,V8,V6,V19), P_generate_b_nonce-{F}(V16,V20), P_encrypt-{F}(V20,V3,V6), P_pair-{F}(V8,V3,V21), P_sent-{F}(V8,V1,V21,V19) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3249: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V31, V22 == V32, V7 == V11, V11 == V16, V16 == V23, V23 == V33, V8 == V12, V12 == V17, V17 == V24, V24 == V34, V13 == V18, V18 == V25, V25 == V35, V19 == V26, V26 == V36, V20 == V27, V27 == V37; #3223 ), references = 1, size of lhs = 23:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), P_pair-{F}(V1,V3,V6), P_pair-{F}(V2,V3,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V9,V1,V11), P_key-{F}(V10,V2,V12), P_key-{F}(V3,V1,V13), P_key-{F}(V14,V1,V13), P_key-{F}(V14,V2,V15), P_key-{F}(V6,V0,V15), P_generate_expiration_time-{F}(V16,V5), P_pair-{F}(V1,V16,V6), P_generate_b_nonce-{F}(V16,V17), P_encrypt-{F}(V17,V3,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3274: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V31, V22 == V32, V7 == V11, V11 == V16, V16 == V23, V23 == V33, V8 == V12, V12 == V17, V17 == V24, V24 == V34, V13 == V18, V18 == V25, V25 == V35, V19 == V26, V26 == V36, V20 == V27, V27 == V37; #3224 ), references = 1, size of lhs = 23:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), P_pair-{F}(V1,V3,V6), P_pair-{F}(V2,V3,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V9,V1,V11), P_key-{F}(V10,V2,V12), P_key-{F}(V3,V1,V13), P_key-{F}(V14,V1,V13), P_key-{F}(V14,V2,V15), P_key-{F}(V6,V0,V15), P_generate_expiration_time-{F}(V16,V5), P_pair-{F}(V1,V16,V6), P_generate_b_nonce-{F}(V16,V17), P_encrypt-{F}(V17,V3,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3328: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V38, V29 == V39, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V40, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V41, V13 == V18, V18 == V25, V25 == V32, V32 == V42, V19 == V26, V26 == V33, V33 == V43, V20 == V27, V27 == V34, V34 == V44; #3294 ), references = 1, size of lhs = 24:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), P_pair-{F}(V1,V3,V6), P_pair-{F}(V2,V3,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V9,V1,V11), P_key-{F}(V10,V2,V12), P_key-{F}(V3,V1,V13), P_key-{F}(V14,V1,V13), P_key-{F}(V14,V2,V15), P_generate_expiration_time-{F}(V16,V5), P_pair-{F}(V1,V16,V6), P_generate_b_nonce-{F}(V16,V17), P_encrypt-{F}(V17,V3,V18), P_key-{F}(V18,V0,V15), P_pair-{F}(V19,V18,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3360: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V38, V29 == V39, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V40, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V41, V13 == V18, V18 == V25, V25 == V32, V32 == V42, V19 == V26, V26 == V33, V33 == V43, V20 == V27, V27 == V34, V34 == V44; #3295 ), references = 1, size of lhs = 24:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), P_pair-{F}(V1,V3,V6), P_pair-{F}(V2,V3,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V9,V1,V11), P_key-{F}(V10,V2,V12), P_key-{F}(V3,V1,V13), P_key-{F}(V14,V1,V13), P_key-{F}(V14,V2,V15), P_generate_expiration_time-{F}(V16,V5), P_pair-{F}(V1,V16,V6), P_generate_b_nonce-{F}(V16,V17), P_encrypt-{F}(V17,V3,V18), P_key-{F}(V18,V0,V15), P_pair-{F}(V19,V18,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3399: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V45, V36 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V49, V20 == V27, V27 == V34, V34 == V41, V41 == V52, V19 == V26, V26 == V33, V33 == V40, V40 == V51; #3296 ), references = 1, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V9,V4,V12), P_key-{F}(V10,V3,V13), P_key-{F}(V14,V3,V11), P_key-{F}(V14,V4,V15), P_pair-{F}(V1,V16,V6), P_generate_expiration_time-{F}(V16,V6), P_generate_b_nonce-{F}(V16,V17), P_encrypt-{F}(V17,V18,V18), P_key-{F}(V18,V0,V11), P_key-{F}(V18,V1,V15), P_pair-{F}(V1,V19,V6), P_pair-{F}(V20,V18,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3424: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V26, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V27, V18 == V34, V7 == V10, V10 == V13, V13 == V16, V16 == V28, V20 == V21, V21 == V22, V22 == V29, V23 == V24, V24 == V25, V25 == V30, V31 == V33; #3400 ), references = 1, size of lhs = 16:
% 242.91/243.10     party_of_protocol-{F}(V0), P_a-{F}(V1), party_of_protocol-{F}(V1), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_t-{F}(V3), P_at-{F}(V4), P_bt-{F}(V5), P_key-{F}(V4,V1,V6), P_key-{F}(V5,V1,V7), P_key-{F}(V2,V1,V8), P_key-{F}(V2,V0,V8), P_key-{F}(V9,V1,V8), P_generate_expiration_time-{F}(V2,V10), P_generate_b_nonce-{F}(V2,V11), P_encrypt-{F}(V11,V2,V2) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3447: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V26, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V27, V18 == V34, V7 == V10, V10 == V13, V13 == V16, V16 == V28, V20 == V21, V21 == V22, V22 == V29, V23 == V24, V24 == V25, V25 == V30, V31 == V33; #3401 ), references = 1, size of lhs = 16:
% 242.91/243.10     party_of_protocol-{F}(V0), P_a-{F}(V1), party_of_protocol-{F}(V1), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_t-{F}(V3), P_at-{F}(V4), P_bt-{F}(V5), P_key-{F}(V4,V1,V6), P_key-{F}(V5,V1,V7), P_key-{F}(V2,V1,V8), P_key-{F}(V2,V0,V8), P_key-{F}(V9,V1,V8), P_generate_expiration_time-{F}(V2,V10), P_generate_b_nonce-{F}(V2,V11), P_encrypt-{F}(V11,V2,V2) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3459: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V12, V4 == V6, V6 == V0, V11 == V14, V7 == V0; #3448 ), references = 1, size of lhs = 10:
% 242.91/243.10     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_generate_expiration_time-{F}(V1,V3), P_generate_b_nonce-{F}(V1,V4), P_encrypt-{F}(V4,V1,V1) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3469: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V12, V4 == V6, V6 == V0, V11 == V14, V7 == V0; #3449 ), references = 1, size of lhs = 10:
% 242.91/243.10     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_generate_expiration_time-{F}(V1,V3), P_generate_b_nonce-{F}(V1,V4), P_encrypt-{F}(V4,V1,V1) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3523: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V29, V22 == V30, V29 == V39, V30 == V40, V7 == V11, V11 == V16, V16 == V23, V23 == V31, V31 == V41, V8 == V12, V12 == V17, V17 == V24, V24 == V32, V32 == V42, V13 == V18, V18 == V25, V25 == V33, V33 == V43, V19 == V26, V26 == V34, V34 == V44, V20 == V27, V27 == V35, V35 == V45; #3489 ), references = 3, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_generate_b_nonce-{F}(V4,V5), P_generate_expiration_time-{F}(V4,V6), P_pair-{F}(V2,V4,V7), P_pair-{F}(V3,V4,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V10,V2,V12), P_key-{F}(V11,V3,V13), P_key-{F}(V4,V2,V14), P_key-{F}(V15,V2,V14), P_key-{F}(V15,V3,V16), P_key-{F}(V7,V0,V16), P_key-{F}(V17,V1,V16), P_encrypt-{F}(V7,V17,V18), P_generate_expiration_time-{F}(V19,V6), P_pair-{F}(V2,V19,V7), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V20,V4,V18) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3555: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V29, V22 == V30, V29 == V39, V30 == V40, V7 == V11, V11 == V16, V16 == V23, V23 == V31, V31 == V41, V8 == V12, V12 == V17, V17 == V24, V24 == V32, V32 == V42, V13 == V18, V18 == V25, V25 == V33, V33 == V43, V19 == V26, V26 == V34, V34 == V44, V20 == V27, V27 == V35, V35 == V45; #3490 ), references = 2, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_generate_b_nonce-{F}(V4,V5), P_generate_expiration_time-{F}(V4,V6), P_pair-{F}(V2,V4,V7), P_pair-{F}(V3,V4,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V10,V2,V12), P_key-{F}(V11,V3,V13), P_key-{F}(V4,V2,V14), P_key-{F}(V15,V2,V14), P_key-{F}(V15,V3,V16), P_key-{F}(V7,V0,V16), P_key-{F}(V17,V1,V16), P_encrypt-{F}(V7,V17,V18), P_generate_expiration_time-{F}(V19,V6), P_pair-{F}(V2,V19,V7), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V20,V4,V18) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3594: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V46, V37 == V47, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V48, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V49, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V50, V20 == V27, V27 == V34, V34 == V42, V42 == V54, V19 == V26, V26 == V33, V33 == V41, V41 == V53; #3491 ), references = 1, size of lhs = 27:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_pair-{F}(V4,V6,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V11,V3,V12), P_key-{F}(V7,V0,V12), P_key-{F}(V13,V1,V12), P_key-{F}(V10,V5,V14), P_key-{F}(V11,V4,V15), P_key-{F}(V16,V4,V12), P_key-{F}(V16,V5,V17), P_key-{F}(V7,V2,V17), P_encrypt-{F}(V7,V13,V18), P_generate_expiration_time-{F}(V19,V18), P_pair-{F}(V2,V19,V7), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V20,V7,V18), P_pair-{F}(V2,V21,V7) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3607: mergings( V0 == V15, V1 == V14, V4 == V16, V2 == V17, V5 == V18, V6 == V19, V7 == V20, V8 == V21, V9 == V24, V10 == V25; #3596 ), references = 1, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V3), P_an_a_nonce-{F}(V4), P_pair-{F}(V3,V4,V5), P_pair-{F}(V2,V4,V6), P_t-{F}(V7), P_pair-{F}(V7,V7,V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V1,V11), P_key-{F}(V12,V0,V11), P_key-{F}(V9,V3,V13), P_key-{F}(V10,V2,V14), P_key-{F}(V15,V2,V11), P_key-{F}(V15,V3,V16), P_key-{F}(V12,V7,V16), P_pair-{F}(V7,V17,V5), P_generate_expiration_time-{F}(V17,V5), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V12,V8), P_pair-{F}(V7,V19,V5), P_pair-{F}(V20,V12,V5) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3661: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V38, V29 == V39, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V40, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V41, V13 == V18, V18 == V25, V25 == V32, V32 == V42, V19 == V26, V26 == V33, V33 == V43, V20 == V27, V27 == V34, V34 == V44; #3627 ), references = 1, size of lhs = 24:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), P_pair-{F}(V1,V3,V6), P_pair-{F}(V2,V3,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V9,V1,V11), P_key-{F}(V10,V2,V12), P_key-{F}(V3,V1,V13), P_key-{F}(V14,V1,V13), P_key-{F}(V14,V2,V15), P_key-{F}(V16,V0,V15), P_generate_expiration_time-{F}(V17,V5), P_pair-{F}(V1,V17,V6), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V3,V6), P_pair-{F}(V19,V16,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3693: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V38, V29 == V39, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V40, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V41, V13 == V18, V18 == V25, V25 == V32, V32 == V42, V19 == V26, V26 == V33, V33 == V43, V20 == V27, V27 == V34, V34 == V44; #3628 ), references = 1, size of lhs = 24:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), P_pair-{F}(V1,V3,V6), P_pair-{F}(V2,V3,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V9,V1,V11), P_key-{F}(V10,V2,V12), P_key-{F}(V3,V1,V13), P_key-{F}(V14,V1,V13), P_key-{F}(V14,V2,V15), P_key-{F}(V16,V0,V15), P_generate_expiration_time-{F}(V17,V5), P_pair-{F}(V1,V17,V6), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V3,V6), P_pair-{F}(V19,V16,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3732: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V45, V36 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V49, V20 == V27, V27 == V34, V34 == V41, V41 == V53, V19 == V26, V26 == V33, V33 == V40, V40 == V52; #3629 ), references = 1, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V12,V0,V11), P_key-{F}(V9,V4,V13), P_key-{F}(V10,V3,V14), P_key-{F}(V15,V3,V11), P_key-{F}(V15,V4,V16), P_key-{F}(V12,V1,V16), P_pair-{F}(V1,V17,V6), P_generate_expiration_time-{F}(V17,V6), P_pair-{F}(V1,V18,V6), P_pair-{F}(V19,V12,V6), P_generate_b_nonce-{F}(V17,V20), P_encrypt-{F}(V20,V12,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3796: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V46, V37 == V47, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V48, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V49, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V50, V19 == V26, V26 == V33, V33 == V41, V41 == V51, V20 == V27, V27 == V34, V34 == V42, V42 == V52; #3755 ), references = 1, size of lhs = 27:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_generate_b_nonce-{F}(V4,V5), P_generate_expiration_time-{F}(V4,V6), P_pair-{F}(V2,V4,V7), P_pair-{F}(V3,V4,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V10,V2,V12), P_key-{F}(V11,V3,V13), P_key-{F}(V4,V2,V14), P_key-{F}(V15,V2,V14), P_key-{F}(V15,V3,V16), P_key-{F}(V17,V0,V16), P_key-{F}(V18,V1,V16), P_encrypt-{F}(V17,V18,V19), P_generate_expiration_time-{F}(V20,V6), P_pair-{F}(V2,V20,V7), P_generate_b_nonce-{F}(V20,V21), P_encrypt-{F}(V21,V4,V19), P_pair-{F}(V22,V17,V7) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3835: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V46, V37 == V47, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V48, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V49, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V50, V19 == V26, V26 == V33, V33 == V41, V41 == V51, V20 == V27, V27 == V34, V34 == V42, V42 == V52; #3756 ), references = 1, size of lhs = 27:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_generate_b_nonce-{F}(V4,V5), P_generate_expiration_time-{F}(V4,V6), P_pair-{F}(V2,V4,V7), P_pair-{F}(V3,V4,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V10,V2,V12), P_key-{F}(V11,V3,V13), P_key-{F}(V4,V2,V14), P_key-{F}(V15,V2,V14), P_key-{F}(V15,V3,V16), P_key-{F}(V17,V0,V16), P_key-{F}(V18,V1,V16), P_encrypt-{F}(V17,V18,V19), P_generate_expiration_time-{F}(V20,V6), P_pair-{F}(V2,V20,V7), P_generate_b_nonce-{F}(V20,V21), P_encrypt-{F}(V21,V4,V19), P_pair-{F}(V22,V17,V7) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3881: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V53, V44 == V54, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V55, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V56, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V57, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V63, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V62; #3757 ), references = 2, size of lhs = 28:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_pair-{F}(V4,V6,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V11,V3,V12), P_key-{F}(V13,V0,V12), P_key-{F}(V14,V1,V12), P_encrypt-{F}(V13,V14,V15), P_key-{F}(V10,V5,V16), P_key-{F}(V11,V4,V17), P_key-{F}(V18,V4,V12), P_key-{F}(V18,V5,V19), P_key-{F}(V13,V2,V19), P_generate_expiration_time-{F}(V20,V15), P_pair-{F}(V2,V20,V7), P_generate_b_nonce-{F}(V20,V21), P_encrypt-{F}(V21,V13,V15), P_pair-{F}(V2,V22,V7), P_pair-{F}(V23,V13,V7) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3912: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V18, V18 == V32, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V19, V19 == V33, V22 == V42, V7 == V10, V10 == V13, V13 == V16, V16 == V20, V20 == V34, V24 == V25, V25 == V26, V26 == V27, V27 == V35, V28 == V29, V29 == V30, V30 == V31, V31 == V36, V37 == V39; #3882 ), references = 2, size of lhs = 19:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V2), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_t-{F}(V4), P_at-{F}(V5), P_bt-{F}(V6), P_key-{F}(V5,V2,V7), P_key-{F}(V6,V2,V8), P_key-{F}(V3,V2,V9), P_key-{F}(V3,V0,V9), P_key-{F}(V10,V2,V9), P_key-{F}(V11,V1,V9), P_encrypt-{F}(V3,V11,V12), P_generate_expiration_time-{F}(V3,V13), P_generate_b_nonce-{F}(V3,V14), P_encrypt-{F}(V14,V3,V12) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3940: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V18, V18 == V32, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V19, V19 == V33, V22 == V42, V7 == V10, V10 == V13, V13 == V16, V16 == V20, V20 == V34, V24 == V25, V25 == V26, V26 == V27, V27 == V35, V28 == V29, V29 == V30, V30 == V31, V31 == V36, V37 == V39; #3883 ), references = 2, size of lhs = 19:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V2), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_t-{F}(V4), P_at-{F}(V5), P_bt-{F}(V6), P_key-{F}(V5,V2,V7), P_key-{F}(V6,V2,V8), P_key-{F}(V3,V2,V9), P_key-{F}(V3,V0,V9), P_key-{F}(V10,V2,V9), P_key-{F}(V11,V1,V9), P_encrypt-{F}(V3,V11,V12), P_generate_expiration_time-{F}(V3,V13), P_generate_b_nonce-{F}(V3,V14), P_encrypt-{F}(V14,V3,V12) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3972: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V17, V17 == V21, V21 == V36, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V18, V18 == V22, V22 == V37, V7 == V10, V10 == V13, V13 == V16, V16 == V19, V19 == V23, V23 == V38, V26 == V27, V27 == V28, V28 == V29, V29 == V30, V30 == V43, V31 == V32, V32 == V33, V33 == V34, V34 == V35, V35 == V42, V39 == V45; #3884 ), references = 1, size of lhs = 21:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V3), P_an_a_nonce-{F}(V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V7,V2,V8), P_key-{F}(V4,V0,V8), P_key-{F}(V4,V3,V8), P_key-{F}(V9,V1,V8), P_encrypt-{F}(V4,V9,V10), P_generate_expiration_time-{F}(V4,V10), P_key-{F}(V6,V3,V11), P_key-{F}(V7,V3,V12), P_key-{F}(V13,V3,V8), P_generate_b_nonce-{F}(V4,V14), P_encrypt-{F}(V14,V4,V10) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3986: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V13, V4 == V6, V6 == V0, V12 == V16, V7 == V0; #3973 ), references = 1, size of lhs = 11:
% 242.91/243.10     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_encrypt-{F}(V1,V1,V3), P_generate_expiration_time-{F}(V1,V4), P_generate_b_nonce-{F}(V1,V5), P_encrypt-{F}(V5,V1,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #3997: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V13, V4 == V6, V6 == V0, V12 == V16, V7 == V0; #3974 ), references = 1, size of lhs = 11:
% 242.91/243.10     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_encrypt-{F}(V1,V1,V3), P_generate_expiration_time-{F}(V1,V4), P_generate_b_nonce-{F}(V1,V5), P_encrypt-{F}(V5,V1,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4008: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V12, V12 == V13, V4 == V6, V6 == V0, V7 == V0; #3975 ), references = 1, size of lhs = 11:
% 242.91/243.10     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_encrypt-{F}(V1,V1,V3), P_generate_expiration_time-{F}(V1,V3), P_generate_b_nonce-{F}(V1,V4), P_encrypt-{F}(V4,V1,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4021: mergings( V2 == V4, V4 == V7, V7 == V8, V8 == V9, V9 == V10, V10 == V13, V3 == V5, V5 == V0, V0 == V12, V6 == V12; #4009 ), references = 1, size of lhs = 9:
% 242.91/243.10     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_generate_b_nonce-{F}(V1,V1), P_t-{F}(V2), P_generate_expiration_time-{F}(V1,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4032: mergings( V2 == V4, V4 == V7, V7 == V8, V8 == V9, V9 == V10, V10 == V13, V3 == V5, V5 == V0, V0 == V12, V6 == V12; #4010 ), references = 1, size of lhs = 9:
% 242.91/243.10     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_generate_b_nonce-{F}(V1,V1), P_t-{F}(V2), P_generate_expiration_time-{F}(V1,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4045: mergings( V2 == V4, V4 == V7, V7 == V8, V8 == V9, V9 == V10, V10 == V13, V3 == V5, V5 == V0, V0 == V12, V6 == V12; #4033 ), references = 1, size of lhs = 8:
% 242.91/243.10     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_generate_b_nonce-{F}(V1,V1), P_t-{F}(V2) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4056: mergings( V2 == V4, V4 == V7, V7 == V8, V8 == V9, V9 == V10, V10 == V13, V3 == V5, V5 == V0, V0 == V12, V6 == V12; #4034 ), references = 1, size of lhs = 8:
% 242.91/243.10     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_generate_b_nonce-{F}(V1,V1), P_t-{F}(V2) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4071: mergings( V0 == V12, V1 == V13, V4 == V14, V2 == V17, V5 == V18, V6 == V19, V7 == V20, V8 == V21, V9 == V22, V10 == V23; #4059 ), references = 2, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), P_pair-{F}(V1,V3,V6), P_pair-{F}(V2,V3,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V9,V1,V11), P_key-{F}(V10,V2,V12), P_key-{F}(V3,V1,V13), P_key-{F}(V14,V1,V13), P_key-{F}(V14,V2,V15), P_key-{F}(V6,V8,V15), P_key-{F}(V16,V0,V15), P_encrypt-{F}(V6,V16,V17), P_generate_expiration_time-{F}(V18,V5), P_pair-{F}(V1,V18,V6), P_generate_b_nonce-{F}(V18,V19), P_encrypt-{F}(V19,V3,V17) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4082: mergings( V0 == V12, V1 == V13, V4 == V14, V2 == V17, V5 == V18, V6 == V19, V7 == V20, V8 == V21, V9 == V22, V10 == V23; #4060 ), references = 2, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), P_pair-{F}(V1,V3,V6), P_pair-{F}(V2,V3,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V9,V1,V11), P_key-{F}(V10,V2,V12), P_key-{F}(V3,V1,V13), P_key-{F}(V14,V1,V13), P_key-{F}(V14,V2,V15), P_key-{F}(V6,V8,V15), P_key-{F}(V16,V0,V15), P_encrypt-{F}(V6,V16,V17), P_generate_expiration_time-{F}(V18,V5), P_pair-{F}(V1,V18,V6), P_generate_b_nonce-{F}(V18,V19), P_encrypt-{F}(V19,V3,V17) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4155: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V52, V44 == V53, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V54, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V55, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V56, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60; #4107 ), references = 1, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V12,V0,V11), P_quadruple-{F}(V1,V1,V12,V12,V13), P_key-{F}(V9,V4,V14), P_key-{F}(V10,V3,V15), P_key-{F}(V16,V3,V11), P_key-{F}(V16,V4,V17), P_key-{F}(V12,V1,V17), P_generate_expiration_time-{F}(V18,V1), P_pair-{F}(V1,V18,V6), P_generate_b_nonce-{F}(V18,V19), P_encrypt-{F}(V19,V12,V13), P_pair-{F}(V1,V20,V6), P_pair-{F}(V21,V12,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4201: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V52, V44 == V53, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V54, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V55, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V56, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V57, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V58; #4108 ), references = 1, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), P_pair-{F}(V1,V3,V6), P_pair-{F}(V2,V3,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V9,V1,V11), P_key-{F}(V10,V2,V12), P_key-{F}(V3,V1,V13), P_key-{F}(V14,V1,V13), P_key-{F}(V14,V2,V15), P_key-{F}(V16,V0,V15), P_generate_expiration_time-{F}(V17,V5), P_pair-{F}(V1,V17,V6), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V3,V19), P_quadruple-{F}(V20,V20,V16,V16,V19), P_pair-{F}(V21,V16,V6), P_pair-{F}(V20,V22,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4247: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V52, V44 == V53, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V54, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V55, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V56, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V57, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V58; #4109 ), references = 1, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), P_pair-{F}(V1,V3,V6), P_pair-{F}(V2,V3,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V9,V1,V11), P_key-{F}(V10,V2,V12), P_key-{F}(V3,V1,V13), P_key-{F}(V14,V1,V13), P_key-{F}(V14,V2,V15), P_key-{F}(V16,V0,V15), P_generate_expiration_time-{F}(V17,V5), P_pair-{F}(V1,V17,V6), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V3,V19), P_quadruple-{F}(V20,V20,V16,V16,V19), P_pair-{F}(V21,V16,V6), P_pair-{F}(V20,V22,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4320: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V52, V44 == V53, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V54, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V55, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V56, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60; #4272 ), references = 1, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V12,V0,V11), P_quadruple-{F}(V1,V1,V12,V1,V13), P_key-{F}(V9,V4,V14), P_key-{F}(V10,V3,V15), P_key-{F}(V16,V3,V11), P_key-{F}(V16,V4,V17), P_key-{F}(V12,V1,V17), P_generate_expiration_time-{F}(V18,V1), P_pair-{F}(V1,V18,V6), P_generate_b_nonce-{F}(V18,V19), P_encrypt-{F}(V19,V12,V13), P_pair-{F}(V1,V20,V6), P_pair-{F}(V21,V12,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4366: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V52, V44 == V53, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V54, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V55, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V56, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V57, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V58; #4273 ), references = 1, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), P_pair-{F}(V1,V3,V6), P_pair-{F}(V2,V3,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V9,V1,V11), P_key-{F}(V10,V2,V12), P_key-{F}(V3,V1,V13), P_key-{F}(V14,V1,V13), P_key-{F}(V14,V2,V15), P_key-{F}(V16,V0,V15), P_generate_expiration_time-{F}(V17,V5), P_pair-{F}(V1,V17,V6), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V3,V19), P_quadruple-{F}(V20,V20,V16,V20,V19), P_pair-{F}(V21,V16,V6), P_pair-{F}(V20,V22,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4412: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V52, V44 == V53, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V54, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V55, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V56, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V57, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V58; #4274 ), references = 1, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), P_pair-{F}(V1,V3,V6), P_pair-{F}(V2,V3,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V9,V1,V11), P_key-{F}(V10,V2,V12), P_key-{F}(V3,V1,V13), P_key-{F}(V14,V1,V13), P_key-{F}(V14,V2,V15), P_key-{F}(V16,V0,V15), P_generate_expiration_time-{F}(V17,V5), P_pair-{F}(V1,V17,V6), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V3,V19), P_quadruple-{F}(V20,V20,V16,V20,V19), P_pair-{F}(V21,V16,V6), P_pair-{F}(V20,V22,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4476: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V46, V37 == V47, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V48, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V49, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V50, V19 == V26, V26 == V33, V33 == V41, V41 == V51, V20 == V27, V27 == V34, V34 == V42, V42 == V52; #4435 ), references = 1, size of lhs = 27:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_generate_b_nonce-{F}(V4,V5), P_generate_expiration_time-{F}(V4,V6), P_pair-{F}(V2,V4,V7), P_pair-{F}(V3,V4,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V10,V2,V12), P_key-{F}(V11,V3,V13), P_key-{F}(V4,V2,V14), P_key-{F}(V15,V2,V14), P_key-{F}(V15,V3,V16), P_key-{F}(V17,V0,V16), P_key-{F}(V18,V1,V16), P_generate_expiration_time-{F}(V19,V6), P_pair-{F}(V2,V19,V7), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V20,V4,V21), P_encrypt-{F}(V7,V18,V21), P_pair-{F}(V22,V17,V7) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4515: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V46, V37 == V47, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V48, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V49, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V50, V19 == V26, V26 == V33, V33 == V41, V41 == V51, V20 == V27, V27 == V34, V34 == V42, V42 == V52; #4436 ), references = 1, size of lhs = 27:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_generate_b_nonce-{F}(V4,V5), P_generate_expiration_time-{F}(V4,V6), P_pair-{F}(V2,V4,V7), P_pair-{F}(V3,V4,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V10,V2,V12), P_key-{F}(V11,V3,V13), P_key-{F}(V4,V2,V14), P_key-{F}(V15,V2,V14), P_key-{F}(V15,V3,V16), P_key-{F}(V17,V0,V16), P_key-{F}(V18,V1,V16), P_generate_expiration_time-{F}(V19,V6), P_pair-{F}(V2,V19,V7), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V20,V4,V21), P_encrypt-{F}(V7,V18,V21), P_pair-{F}(V22,V17,V7) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4561: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V53, V44 == V54, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V55, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V56, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V57, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V62, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V61; #4437 ), references = 2, size of lhs = 28:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_pair-{F}(V4,V6,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V11,V3,V12), P_key-{F}(V13,V0,V12), P_key-{F}(V14,V1,V12), P_key-{F}(V10,V5,V15), P_key-{F}(V11,V4,V16), P_key-{F}(V17,V4,V12), P_key-{F}(V17,V5,V18), P_key-{F}(V13,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_pair-{F}(V2,V19,V7), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V20,V13,V21), P_encrypt-{F}(V7,V14,V21), P_pair-{F}(V2,V22,V7), P_pair-{F}(V23,V13,V7) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4603: mergings( V3 == V1, V1 == V6, V36 == V37, V6 == V10, V37 == V38, V10 == V14, V38 == V40, V14 == V18, V40 == V42, V18 == V23, V42 == V44, V23 == V46, V44 == V47, V4 == V7, V7 == V11, V11 == V15, V15 == V19, V19 == V24, V24 == V48, V5 == V8, V8 == V12, V12 == V16, V16 == V20, V20 == V25, V25 == V49, V9 == V13, V13 == V17, V17 == V21, V21 == V26, V26 == V50, V31 == V32, V32 == V33, V33 == V34, V34 == V51, V39 == V41, V41 == V43, V43 == V45, V45 == V52; #4562 ), references = 1, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_generate_b_nonce-{F}(V4,V5), P_generate_expiration_time-{F}(V4,V6), P_pair-{F}(V2,V4,V7), P_pair-{F}(V3,V4,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V10,V2,V12), P_key-{F}(V11,V3,V13), P_key-{F}(V4,V2,V14), P_key-{F}(V15,V2,V14), P_key-{F}(V15,V3,V16), P_key-{F}(V4,V1,V16), P_key-{F}(V17,V0,V16), P_generate_expiration_time-{F}(V18,V6), P_pair-{F}(V2,V18,V7), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V19,V17,V7) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4642: mergings( V3 == V1, V1 == V6, V36 == V37, V6 == V10, V37 == V38, V10 == V14, V38 == V40, V14 == V18, V40 == V42, V18 == V23, V42 == V44, V23 == V46, V44 == V47, V4 == V7, V7 == V11, V11 == V15, V15 == V19, V19 == V24, V24 == V48, V5 == V8, V8 == V12, V12 == V16, V16 == V20, V20 == V25, V25 == V49, V9 == V13, V13 == V17, V17 == V21, V21 == V26, V26 == V50, V31 == V32, V32 == V33, V33 == V34, V34 == V51, V39 == V41, V41 == V43, V43 == V45, V45 == V52; #4563 ), references = 1, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_generate_b_nonce-{F}(V4,V5), P_generate_expiration_time-{F}(V4,V6), P_pair-{F}(V2,V4,V7), P_pair-{F}(V3,V4,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V10,V2,V12), P_key-{F}(V11,V3,V13), P_key-{F}(V4,V2,V14), P_key-{F}(V15,V2,V14), P_key-{F}(V15,V3,V16), P_key-{F}(V4,V1,V16), P_key-{F}(V17,V0,V16), P_generate_expiration_time-{F}(V18,V6), P_pair-{F}(V2,V18,V7), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V19,V17,V7) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4688: mergings( V3 == V4, V4 == V7, V36 == V37, V7 == V11, V37 == V38, V11 == V15, V38 == V40, V15 == V19, V40 == V42, V19 == V23, V42 == V44, V23 == V28, V44 == V46, V28 == V54, V46 == V55, V5 == V8, V8 == V12, V12 == V16, V16 == V20, V20 == V24, V24 == V29, V29 == V56, V6 == V9, V9 == V13, V13 == V17, V17 == V21, V21 == V25, V25 == V30, V30 == V57, V10 == V14, V14 == V18, V18 == V22, V22 == V26, V26 == V31, V31 == V58, V39 == V41, V41 == V43, V43 == V45, V45 == V47, V47 == V61, V49 == V50, V50 == V51, V51 == V52, V52 == V53, V53 == V60; #4564 ), references = 1, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_pair-{F}(V4,V6,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V11,V3,V12), P_key-{F}(V13,V0,V12), P_key-{F}(V13,V1,V12), P_key-{F}(V10,V5,V14), P_key-{F}(V11,V4,V15), P_key-{F}(V16,V4,V12), P_key-{F}(V16,V5,V17), P_key-{F}(V13,V2,V17), P_generate_expiration_time-{F}(V18,V2), P_pair-{F}(V2,V18,V7), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V2,V19,V7), P_pair-{F}(V20,V13,V7) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4706: mergings( V3 == V22, V4 == V20, V5 == V23, V6 == V24, V7 == V25, V8 == V26, V9 == V27, V10 == V28, V11 == V29, V12 == V30, V13 == V31; #4692 ), references = 23, size of lhs = 31:
% 242.91/243.10     intruder_message-{F}(V0), intruder_holds-{F}(V1), party_of_protocol-{F}(V2), intruder_message-{F}(V3), P_key-{F}(V3,V2,V1), intruder_message-{F}(V4), intruder_message-{F}(V5), party_of_protocol-{F}(V5), intruder_holds-{F}(V6), party_of_protocol-{F}(V7), party_of_protocol-{F}(V8), P_b-{F}(V8), b_stored-{F}(V9), P_a-{F}(V10), P_an_a_nonce-{F}(V11), P_pair-{F}(V10,V11,V12), P_sent-{F}(V10,V8,V12,V13), P_pair-{F}(V8,V11,V14), P_t-{F}(V15), P_at-{F}(V16), P_bt-{F}(V17), P_key-{F}(V17,V7,V6), P_key-{F}(V16,V10,V18), P_key-{F}(V17,V8,V19), intruder_holds-{F}(V20), P_key-{F}(V21,V8,V20), P_key-{F}(V21,V10,V22), P_key-{F}(V3,V5,V22), P_pair-{F}(V5,V23,V9), P_generate_expiration_time-{F}(V23,V4), P_generate_b_nonce-{F}(V23,V0) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4718: mergings( V3 == V22, V4 == V20, V5 == V23, V6 == V24, V7 == V25, V8 == V26, V9 == V27, V10 == V28, V11 == V29, V12 == V30, V13 == V31; #4693 ), references = 22, size of lhs = 31:
% 242.91/243.10     intruder_message-{F}(V0), intruder_holds-{F}(V1), party_of_protocol-{F}(V2), fresh_to_b-{F}(V3), P_key-{F}(V3,V2,V1), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), message-{F}(V6), party_of_protocol-{F}(V7), party_of_protocol-{F}(V8), P_b-{F}(V8), b_stored-{F}(V9), P_a-{F}(V10), P_an_a_nonce-{F}(V11), P_pair-{F}(V10,V11,V12), P_sent-{F}(V10,V8,V12,V13), P_pair-{F}(V8,V11,V14), P_t-{F}(V15), P_at-{F}(V16), P_bt-{F}(V17), P_key-{F}(V16,V10,V18), P_key-{F}(V17,V8,V19), intruder_holds-{F}(V20), P_key-{F}(V21,V8,V20), P_key-{F}(V21,V10,V22), P_key-{F}(V3,V7,V22), P_pair-{F}(V7,V23,V9), P_generate_expiration_time-{F}(V23,V5), P_generate_b_nonce-{F}(V23,V0), P_pair-{F}(V7,V3,V24), P_sent-{F}(V7,V8,V24,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4730: mergings( V3 == V22, V4 == V20, V5 == V23, V6 == V24, V7 == V25, V8 == V26, V9 == V27, V10 == V28, V11 == V29, V12 == V30, V13 == V31; #4694 ), references = 22, size of lhs = 31:
% 242.91/243.10     intruder_message-{F}(V0), intruder_holds-{F}(V1), party_of_protocol-{F}(V2), fresh_to_b-{F}(V3), P_key-{F}(V3,V2,V1), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), message-{F}(V6), party_of_protocol-{F}(V7), party_of_protocol-{F}(V8), P_b-{F}(V8), b_stored-{F}(V9), P_a-{F}(V10), P_an_a_nonce-{F}(V11), P_pair-{F}(V10,V11,V12), P_sent-{F}(V10,V8,V12,V13), P_pair-{F}(V8,V11,V14), P_t-{F}(V15), P_at-{F}(V16), P_bt-{F}(V17), P_key-{F}(V16,V10,V18), P_key-{F}(V17,V8,V19), intruder_holds-{F}(V20), P_key-{F}(V21,V8,V20), P_key-{F}(V21,V10,V22), P_key-{F}(V3,V7,V22), P_pair-{F}(V7,V23,V9), P_generate_expiration_time-{F}(V23,V5), P_generate_b_nonce-{F}(V23,V0), P_pair-{F}(V7,V3,V24), P_sent-{F}(V7,V8,V24,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4800: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V43, V37 == V44, V43 == V52, V44 == V53, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V45, V45 == V54, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V46, V46 == V55, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V47, V47 == V56, V20 == V27, V27 == V34, V34 == V42, V42 == V49, V49 == V62, V19 == V26, V26 == V33, V33 == V41, V41 == V48, V48 == V61; #4752 ), references = 1, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V2), P_pair-{F}(V4,V6,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V3,V11), P_key-{F}(V12,V0,V11), P_key-{F}(V12,V1,V11), P_pair-{F}(V13,V12,V2), P_pair-{F}(V12,V2,V14), P_key-{F}(V9,V5,V15), P_key-{F}(V10,V4,V16), P_key-{F}(V17,V4,V11), P_key-{F}(V17,V5,V18), P_key-{F}(V12,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V14), P_pair-{F}(V2,V19,V2) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4846: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V43, V37 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V41, V41 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V42, V42 == V49, V49 == V61; #4753 ), references = 1, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_pair-{F}(V6,V9,V19), P_pair-{F}(V20,V6,V9) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4892: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V43, V37 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V41, V41 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V42, V42 == V49, V49 == V61; #4754 ), references = 1, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_pair-{F}(V6,V9,V19), P_pair-{F}(V20,V6,V9) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4909: mergings( V0 == V14, V1 == V13, V4 == V15, V2 == V16, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V9 == V23, V10 == V24; #4896 ), references = 1, size of lhs = 24:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V3), P_an_a_nonce-{F}(V4), P_pair-{F}(V3,V4,V5), P_pair-{F}(V2,V4,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V9,V7,V10), P_key-{F}(V11,V0,V10), P_key-{F}(V8,V3,V12), P_key-{F}(V9,V2,V13), P_key-{F}(V14,V2,V10), P_key-{F}(V14,V3,V15), P_key-{F}(V11,V1,V15), P_generate_expiration_time-{F}(V16,V1), P_pair-{F}(V1,V16,V5), P_generate_b_nonce-{F}(V16,V17), P_encrypt-{F}(V17,V11,V1), P_pair-{F}(V1,V18,V5), P_pair-{F}(V19,V11,V5) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4920: mergings( V0 == V15, V1 == V14, V4 == V16, V2 == V17, V5 == V18, V6 == V19, V7 == V20, V8 == V21, V9 == V26, V10 == V27; #4897 ), references = 1, size of lhs = 27:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V8,V11), P_key-{F}(V12,V0,V11), P_key-{F}(V13,V1,V11), P_encrypt-{F}(V12,V13,V14), P_key-{F}(V9,V4,V15), P_key-{F}(V10,V3,V16), P_key-{F}(V17,V3,V11), P_key-{F}(V17,V4,V18), P_key-{F}(V12,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_pair-{F}(V2,V19,V6), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V20,V12,V14), P_pair-{F}(V2,V21,V6), P_pair-{F}(V22,V12,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4931: mergings( V0 == V15, V1 == V14, V4 == V16, V2 == V17, V5 == V18, V6 == V19, V7 == V20, V8 == V21, V9 == V26, V10 == V27; #4898 ), references = 1, size of lhs = 27:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V8,V11), P_key-{F}(V12,V0,V11), P_key-{F}(V13,V1,V11), P_encrypt-{F}(V12,V13,V14), P_key-{F}(V9,V4,V15), P_key-{F}(V10,V3,V16), P_key-{F}(V17,V3,V11), P_key-{F}(V17,V4,V18), P_key-{F}(V12,V2,V18), P_generate_expiration_time-{F}(V19,V14), P_pair-{F}(V2,V19,V6), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V20,V12,V14), P_pair-{F}(V2,V21,V6), P_pair-{F}(V22,V12,V6) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4978: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V44, V36 == V45, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V46, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V47, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V48, V20 == V27, V27 == V34, V34 == V41, V41 == V50, V19 == V26, V26 == V33, V33 == V40, V40 == V49; #4939 ), references = 2, size of lhs = 26:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V3), P_an_a_nonce-{F}(V4), P_pair-{F}(V3,V4,V5), P_pair-{F}(V2,V4,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V8,V3,V10), P_key-{F}(V9,V2,V11), P_pair-{F}(V1,V12,V5), P_generate_expiration_time-{F}(V12,V13), P_generate_b_nonce-{F}(V12,V14), P_key-{F}(V15,V0,V16), P_key-{F}(V17,V2,V16), P_key-{F}(V17,V3,V18), P_key-{F}(V19,V1,V18), P_triple-{F}(V1,V19,V13,V20), P_encrypt-{F}(V20,V9,V21), P_encrypt-{F}(V14,V19,V22), P_pair-{F}(V21,V22,V23), P_pair-{F}(V24,V15,V5), P_pair-{F}(V23,V25,V5) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #4991: mergings( V0 == V13, V1 == V12, V4 == V14, V2 == V15, V5 == V16, V6 == V17, V7 == V18, V8 == V19, V9 == V20, V10 == V21; #4980 ), references = 1, size of lhs = 25:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_pair-{F}(V2,V3,V4), P_pair-{F}(V1,V3,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V2,V9), P_key-{F}(V8,V1,V10), P_pair-{F}(V0,V11,V4), P_generate_expiration_time-{F}(V11,V12), P_generate_b_nonce-{F}(V11,V13), P_key-{F}(V14,V6,V15), P_key-{F}(V16,V1,V15), P_key-{F}(V16,V2,V17), P_key-{F}(V18,V0,V17), P_triple-{F}(V0,V18,V12,V19), P_encrypt-{F}(V19,V8,V20), P_encrypt-{F}(V13,V18,V21), P_pair-{F}(V20,V21,V22), P_pair-{F}(V23,V14,V4), P_pair-{F}(V22,V24,V4) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #5064: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V53, V44 == V54, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V55, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V56, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V57, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V62, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V61; #5016 ), references = 1, size of lhs = 27:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_pair-{F}(V4,V6,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V11,V3,V12), P_key-{F}(V13,V0,V12), P_key-{F}(V13,V1,V12), P_pair-{F}(V13,V2,V14), P_key-{F}(V10,V5,V15), P_key-{F}(V11,V4,V16), P_key-{F}(V17,V4,V12), P_key-{F}(V17,V5,V18), P_key-{F}(V13,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V14), P_pair-{F}(V2,V19,V7), P_pair-{F}(V2,V20,V7), P_pair-{F}(V21,V13,V7) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #5110: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61; #5017 ), references = 1, size of lhs = 27:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_pair-{F}(V6,V20,V19), P_pair-{F}(V21,V6,V9), P_pair-{F}(V20,V22,V9) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #5156: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61; #5018 ), references = 1, size of lhs = 27:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_pair-{F}(V6,V20,V19), P_pair-{F}(V21,V6,V9), P_pair-{F}(V20,V22,V9) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #5192: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V17, V17 == V21, V21 == V38, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V18, V18 == V22, V22 == V39, V26 == V45, V7 == V10, V10 == V13, V13 == V16, V16 == V19, V19 == V23, V23 == V40, V28 == V29, V29 == V30, V30 == V31, V31 == V32, V32 == V41, V33 == V34, V34 == V35, V35 == V36, V36 == V37, V37 == V42, V25 == V44; #5158 ), references = 2, size of lhs = 18:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V2), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_key-{F}(V3,V1,V4), P_key-{F}(V3,V0,V4), P_key-{F}(V3,V2,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V6,V2,V8), P_key-{F}(V7,V2,V9), P_key-{F}(V10,V2,V4), P_generate_expiration_time-{F}(V3,V11), P_generate_b_nonce-{F}(V3,V12), P_pair-{F}(V3,V2,V12) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #5225: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V17, V17 == V21, V21 == V38, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V18, V18 == V22, V22 == V39, V26 == V45, V7 == V10, V10 == V13, V13 == V16, V16 == V19, V19 == V23, V23 == V40, V28 == V29, V29 == V30, V30 == V31, V31 == V32, V32 == V41, V33 == V34, V34 == V35, V35 == V36, V36 == V37, V37 == V42, V25 == V44; #5159 ), references = 1, size of lhs = 18:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V2), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_key-{F}(V3,V1,V4), P_key-{F}(V3,V0,V4), P_key-{F}(V3,V2,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V6,V2,V8), P_key-{F}(V7,V2,V9), P_key-{F}(V10,V2,V4), P_generate_expiration_time-{F}(V3,V11), P_generate_b_nonce-{F}(V3,V12), P_pair-{F}(V3,V2,V12) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #5257: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V17, V17 == V21, V21 == V36, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V18, V18 == V22, V22 == V37, V7 == V10, V10 == V13, V13 == V16, V16 == V19, V19 == V23, V23 == V38, V26 == V27, V27 == V28, V28 == V29, V29 == V30, V30 == V42, V31 == V32, V32 == V33, V33 == V34, V34 == V35, V35 == V41, V39 == V44; #5157 ), references = 1, size of lhs = 20:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V3), P_an_a_nonce-{F}(V4), P_generate_expiration_time-{F}(V4,V3), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V7,V2,V8), P_key-{F}(V4,V0,V8), P_key-{F}(V4,V1,V8), P_key-{F}(V4,V3,V8), P_pair-{F}(V4,V3,V9), P_generate_b_nonce-{F}(V4,V9), P_key-{F}(V6,V3,V10), P_key-{F}(V7,V3,V11), P_key-{F}(V12,V3,V8) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #5271: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V12, V12 == V13, V4 == V6, V6 == V0, V7 == V0; #5260 ), references = 1, size of lhs = 10:
% 242.91/243.10     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V0), P_an_a_nonce-{F}(V1), P_generate_expiration_time-{F}(V1,V0), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_pair-{F}(V1,V0,V3), P_generate_b_nonce-{F}(V1,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #5283: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V12, V12 == V14, V4 == V6, V6 == V0, V13 == V16, V7 == V0; #5258 ), references = 1, size of lhs = 10:
% 242.91/243.10     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_generate_expiration_time-{F}(V1,V3), P_generate_b_nonce-{F}(V1,V4), P_pair-{F}(V1,V0,V4) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #5295: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V12, V12 == V14, V4 == V6, V6 == V0, V13 == V16, V7 == V0; #5259 ), references = 1, size of lhs = 10:
% 242.91/243.10     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_generate_expiration_time-{F}(V1,V3), P_generate_b_nonce-{F}(V1,V4), P_pair-{F}(V1,V0,V4) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #5358: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V51, V37 == V52, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V53, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V54, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V55, V20 == V27, V27 == V34, V34 == V42, V42 == V57, V19 == V26, V26 == V33, V33 == V41, V41 == V56; #5317 ), references = 2, size of lhs = 28:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_key-{F}(V3,V2,V4), P_key-{F}(V5,V0,V4), P_pair-{F}(V6,V5,V3), P_key-{F}(V7,V1,V4), P_encrypt-{F}(V5,V7,V8), party_of_protocol-{F}(V9), party_of_protocol-{F}(V10), P_b-{F}(V10), P_a-{F}(V11), P_an_a_nonce-{F}(V12), P_pair-{F}(V11,V12,V3), P_pair-{F}(V10,V12,V13), P_t-{F}(V14), P_at-{F}(V15), P_bt-{F}(V16), P_key-{F}(V16,V9,V4), P_key-{F}(V15,V11,V17), P_key-{F}(V16,V10,V18), P_key-{F}(V19,V10,V4), P_key-{F}(V19,V11,V20), P_key-{F}(V3,V3,V20), P_generate_expiration_time-{F}(V21,V3), P_generate_b_nonce-{F}(V21,V8), P_pair-{F}(V3,V21,V3) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #5397: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V51, V37 == V52, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V53, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V54, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V55, V19 == V26, V26 == V33, V33 == V41, V41 == V56, V20 == V27, V27 == V34, V34 == V42, V42 == V57; #5318 ), references = 3, size of lhs = 28:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V0,V6), P_key-{F}(V8,V1,V6), P_encrypt-{F}(V7,V8,V9), P_generate_b_nonce-{F}(V5,V10), P_generate_expiration_time-{F}(V5,V11), P_pair-{F}(V3,V5,V12), P_pair-{F}(V4,V5,V13), P_t-{F}(V14), P_at-{F}(V15), P_bt-{F}(V16), P_key-{F}(V15,V3,V17), P_key-{F}(V16,V4,V18), P_key-{F}(V19,V4,V6), P_key-{F}(V19,V3,V20), P_key-{F}(V5,V3,V20), P_generate_expiration_time-{F}(V21,V11), P_generate_b_nonce-{F}(V21,V9), P_pair-{F}(V3,V21,V12), P_pair-{F}(V22,V7,V12) | FALSE
% 242.91/243.10        (used 0 times, uses = {})
% 242.91/243.10  
% 242.91/243.10  #5436: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V51, V37 == V52, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V53, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V54, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V55, V19 == V26, V26 == V33, V33 == V41, V41 == V56, V20 == V27, V27 == V34, V34 == V42, V42 == V57; #5319 ), references = 2, size of lhs = 28:
% 242.91/243.10     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V0,V6), P_key-{F}(V8,V1,V6), P_encrypt-{F}(V7,V8,V9), P_generate_b_nonce-{F}(V5,V10), P_generate_expiration_time-{F}(V5,V11), P_pair-{F}(V3,V5,V12), P_pair-{F}(V4,V5,V13), P_t-{F}(V14), P_at-{F}(V15), P_bt-{F}(V16), P_key-{F}(V15,V3,V17), P_key-{F}(V16,V4,V18), P_key-{F}(V19,V4,V6), P_key-{F}(V19,V3,V20), P_key-{F}(V5,V3,V20), P_generate_expiration_time-{F}(V21,V11), P_generate_b_nonce-{F}(V21,V9), P_pair-{F}(V3,V21,V12), P_pair-{F}(V22,V7,V12) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #5449: mergings( V0 == V20, V1 == V19, V4 == V21, V2 == V13, V5 == V22, V6 == V23, V7 == V24, V8 == V25, V9 == V26, V10 == V27; #5438 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_key-{F}(V2,V1,V3), P_key-{F}(V4,V0,V3), party_of_protocol-{F}(V5), P_b-{F}(V5), P_a-{F}(V6), P_an_a_nonce-{F}(V7), P_pair-{F}(V6,V7,V2), P_pair-{F}(V5,V7,V8), P_t-{F}(V9), P_key-{F}(V10,V9,V3), P_pair-{F}(V11,V10,V2), P_encrypt-{F}(V10,V4,V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V14,V9,V3), P_key-{F}(V13,V6,V15), P_key-{F}(V14,V5,V16), P_key-{F}(V17,V5,V3), P_key-{F}(V17,V6,V18), P_key-{F}(V2,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V12), P_pair-{F}(V2,V19,V2) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #5512: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V45, V37 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V49, V20 == V27, V27 == V34, V34 == V42, V42 == V55, V19 == V26, V26 == V33, V33 == V41, V41 == V54; #5471 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V2), P_pair-{F}(V4,V6,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V3,V11), P_key-{F}(V12,V0,V11), P_key-{F}(V12,V1,V11), P_pair-{F}(V13,V12,V2), P_quadruple-{F}(V12,V12,V12,V2,V14), P_key-{F}(V9,V5,V15), P_key-{F}(V10,V4,V16), P_key-{F}(V17,V4,V11), P_key-{F}(V17,V5,V18), P_key-{F}(V12,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V14), P_pair-{F}(V2,V19,V2) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #5551: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V48, V37 == V49, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V50, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V51, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V52, V19 == V26, V26 == V33, V33 == V41, V41 == V53, V20 == V27, V27 == V34, V34 == V42, V42 == V54; #5472 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_quadruple-{F}(V6,V6,V6,V9,V19), P_pair-{F}(V20,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #5590: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V48, V37 == V49, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V50, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V51, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V52, V19 == V26, V26 == V33, V33 == V41, V41 == V53, V20 == V27, V27 == V34, V34 == V42, V42 == V54; #5473 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_quadruple-{F}(V6,V6,V6,V9,V19), P_pair-{F}(V20,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #5653: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V45, V37 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V49, V20 == V27, V27 == V34, V34 == V42, V42 == V55, V19 == V26, V26 == V33, V33 == V41, V41 == V54; #5612 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V2), P_pair-{F}(V4,V6,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V3,V11), P_key-{F}(V12,V0,V11), P_key-{F}(V12,V1,V11), P_pair-{F}(V13,V12,V2), P_quadruple-{F}(V12,V12,V2,V2,V14), P_key-{F}(V9,V5,V15), P_key-{F}(V10,V4,V16), P_key-{F}(V17,V4,V11), P_key-{F}(V17,V5,V18), P_key-{F}(V12,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V14), P_pair-{F}(V2,V19,V2) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #5692: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V48, V37 == V49, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V50, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V51, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V52, V19 == V26, V26 == V33, V33 == V41, V41 == V53, V20 == V27, V27 == V34, V34 == V42, V42 == V54; #5613 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_quadruple-{F}(V6,V6,V9,V9,V19), P_pair-{F}(V20,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #5731: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V48, V37 == V49, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V50, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V51, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V52, V19 == V26, V26 == V33, V33 == V41, V41 == V53, V20 == V27, V27 == V34, V34 == V42, V42 == V54; #5614 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_quadruple-{F}(V6,V6,V9,V9,V19), P_pair-{F}(V20,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #5794: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V45, V37 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V49, V20 == V27, V27 == V34, V34 == V42, V42 == V55, V19 == V26, V26 == V33, V33 == V41, V41 == V54; #5753 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V2), P_pair-{F}(V4,V6,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V3,V11), P_key-{F}(V12,V0,V11), P_key-{F}(V12,V1,V11), P_pair-{F}(V13,V12,V2), P_triple-{F}(V12,V2,V12,V14), P_key-{F}(V9,V5,V15), P_key-{F}(V10,V4,V16), P_key-{F}(V17,V4,V11), P_key-{F}(V17,V5,V18), P_key-{F}(V12,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V14), P_pair-{F}(V2,V19,V2) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #5833: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V48, V37 == V49, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V50, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V51, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V52, V19 == V26, V26 == V33, V33 == V41, V41 == V53, V20 == V27, V27 == V34, V34 == V42, V42 == V54; #5754 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_triple-{F}(V6,V9,V6,V19), P_pair-{F}(V20,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #5872: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V48, V37 == V49, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V50, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V51, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V52, V19 == V26, V26 == V33, V33 == V41, V41 == V53, V20 == V27, V27 == V34, V34 == V42, V42 == V54; #5755 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_triple-{F}(V6,V9,V6,V19), P_pair-{F}(V20,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #5935: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V45, V37 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V49, V20 == V27, V27 == V34, V34 == V42, V42 == V55, V19 == V26, V26 == V33, V33 == V41, V41 == V54; #5894 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V2), P_pair-{F}(V4,V6,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V3,V11), P_key-{F}(V12,V0,V11), P_key-{F}(V12,V1,V11), P_pair-{F}(V13,V12,V2), P_quadruple-{F}(V12,V12,V2,V12,V14), P_key-{F}(V9,V5,V15), P_key-{F}(V10,V4,V16), P_key-{F}(V17,V4,V11), P_key-{F}(V17,V5,V18), P_key-{F}(V12,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V14), P_pair-{F}(V2,V19,V2) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #5974: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V48, V37 == V49, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V50, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V51, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V52, V19 == V26, V26 == V33, V33 == V41, V41 == V53, V20 == V27, V27 == V34, V34 == V42, V42 == V54; #5895 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_quadruple-{F}(V6,V6,V9,V6,V19), P_pair-{F}(V20,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6013: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V48, V37 == V49, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V50, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V51, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V52, V19 == V26, V26 == V33, V33 == V41, V41 == V53, V20 == V27, V27 == V34, V34 == V42, V42 == V54; #5896 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_quadruple-{F}(V6,V6,V9,V6,V19), P_pair-{F}(V20,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6086: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V44, V37 == V45, V44 == V56, V45 == V57, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V46, V46 == V58, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V47, V47 == V59, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V42, V42 == V50, V50 == V66, V19 == V26, V26 == V33, V33 == V41, V41 == V49, V49 == V65; #6038 ), references = 1, size of lhs = 30:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V4,V3,V5), P_key-{F}(V6,V2,V5), party_of_protocol-{F}(V7), party_of_protocol-{F}(V8), P_b-{F}(V8), P_a-{F}(V9), P_an_a_nonce-{F}(V10), P_pair-{F}(V9,V10,V4), P_pair-{F}(V8,V10,V11), P_t-{F}(V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V14,V7,V15), P_key-{F}(V16,V0,V15), P_pair-{F}(V17,V16,V4), P_encrypt-{F}(V16,V6,V18), P_key-{F}(V13,V9,V19), P_key-{F}(V14,V8,V20), P_key-{F}(V21,V8,V5), P_key-{F}(V21,V9,V22), P_key-{F}(V4,V4,V22), P_generate_expiration_time-{F}(V23,V4), P_generate_b_nonce-{F}(V23,V18), P_pair-{F}(V4,V23,V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6132: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V44, V37 == V45, V44 == V57, V45 == V58, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V46, V46 == V59, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V47, V47 == V60, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V48, V48 == V61, V19 == V26, V26 == V33, V33 == V41, V41 == V49, V49 == V62, V20 == V27, V27 == V34, V34 == V42, V42 == V50, V50 == V63; #6039 ), references = 4, size of lhs = 30:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_a-{F}(V4), party_of_protocol-{F}(V5), P_b-{F}(V5), P_an_a_nonce-{F}(V6), P_key-{F}(V6,V3,V7), P_key-{F}(V8,V0,V7), P_generate_b_nonce-{F}(V6,V9), P_generate_expiration_time-{F}(V6,V10), P_pair-{F}(V4,V6,V11), P_pair-{F}(V5,V6,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V4,V16), P_key-{F}(V15,V5,V17), P_key-{F}(V18,V5,V7), P_key-{F}(V18,V4,V19), P_key-{F}(V6,V4,V19), P_generate_expiration_time-{F}(V20,V10), P_pair-{F}(V4,V20,V11), P_generate_b_nonce-{F}(V20,V21), P_encrypt-{F}(V8,V22,V21), P_key-{F}(V22,V2,V23), P_key-{F}(V11,V1,V23), P_pair-{F}(V24,V8,V11) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6178: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V44, V37 == V45, V44 == V57, V45 == V58, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V46, V46 == V59, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V47, V47 == V60, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V48, V48 == V61, V19 == V26, V26 == V33, V33 == V41, V41 == V49, V49 == V62, V20 == V27, V27 == V34, V34 == V42, V42 == V50, V50 == V63; #6040 ), references = 4, size of lhs = 30:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_a-{F}(V4), party_of_protocol-{F}(V5), P_b-{F}(V5), P_an_a_nonce-{F}(V6), P_key-{F}(V6,V3,V7), P_key-{F}(V8,V0,V7), P_generate_b_nonce-{F}(V6,V9), P_generate_expiration_time-{F}(V6,V10), P_pair-{F}(V4,V6,V11), P_pair-{F}(V5,V6,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V4,V16), P_key-{F}(V15,V5,V17), P_key-{F}(V18,V5,V7), P_key-{F}(V18,V4,V19), P_key-{F}(V6,V4,V19), P_generate_expiration_time-{F}(V20,V10), P_pair-{F}(V4,V20,V11), P_generate_b_nonce-{F}(V20,V21), P_encrypt-{F}(V8,V22,V21), P_key-{F}(V22,V2,V23), P_key-{F}(V11,V1,V23), P_pair-{F}(V24,V8,V11) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6228: mergings( V0 == V33, V33 == V34, V34 == V36, V36 == V38, V38 == V40, V40 == V42, V42 == V32, V32 == V50, V2 == V3, V3 == V6, V6 == V10, V10 == V14, V14 == V18, V18 == V23, V23 == V27, V27 == V49, V4 == V7, V7 == V11, V11 == V15, V15 == V19, V19 == V24, V24 == V28, V28 == V51, V5 == V8, V8 == V12, V12 == V16, V16 == V20, V20 == V25, V25 == V29, V29 == V52, V9 == V13, V13 == V17, V17 == V21, V21 == V26, V26 == V30, V30 == V53, V35 == V37, V37 == V39, V39 == V41, V41 == V43, V43 == V59, V44 == V45, V45 == V46, V46 == V47, V47 == V48, V48 == V58; #6179 ), references = 1, size of lhs = 19:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_pair-{F}(V2,V3,V2), P_t-{F}(V4), P_at-{F}(V5), P_bt-{F}(V6), P_key-{F}(V6,V1,V7), P_key-{F}(V8,V0,V7), P_pair-{F}(V9,V8,V2), P_encrypt-{F}(V8,V2,V10), P_key-{F}(V5,V2,V11), P_key-{F}(V6,V2,V12), P_generate_expiration_time-{F}(V13,V2), P_generate_b_nonce-{F}(V13,V10), P_pair-{F}(V2,V13,V2) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6274: mergings( V3 == V4, V4 == V7, V44 == V45, V7 == V11, V45 == V46, V11 == V15, V46 == V48, V15 == V19, V48 == V50, V19 == V24, V50 == V52, V24 == V28, V52 == V54, V28 == V56, V54 == V57, V5 == V8, V8 == V12, V12 == V16, V16 == V20, V20 == V25, V25 == V29, V29 == V58, V6 == V9, V9 == V13, V13 == V17, V17 == V21, V21 == V26, V26 == V30, V30 == V59, V10 == V14, V14 == V18, V18 == V22, V22 == V27, V27 == V31, V31 == V60, V38 == V39, V39 == V40, V40 == V41, V41 == V42, V42 == V61, V47 == V49, V49 == V51, V51 == V53, V53 == V55, V55 == V62; #6180 ), references = 2, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V0,V6), P_generate_b_nonce-{F}(V5,V8), P_generate_expiration_time-{F}(V5,V9), P_pair-{F}(V3,V5,V10), P_pair-{F}(V4,V5,V11), P_t-{F}(V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V13,V3,V15), P_key-{F}(V14,V4,V16), P_key-{F}(V17,V4,V6), P_key-{F}(V17,V3,V18), P_key-{F}(V5,V3,V18), P_generate_expiration_time-{F}(V19,V9), P_pair-{F}(V3,V19,V10), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V7,V10,V20), P_pair-{F}(V21,V7,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6320: mergings( V3 == V4, V4 == V7, V44 == V45, V7 == V11, V45 == V46, V11 == V15, V46 == V48, V15 == V19, V48 == V50, V19 == V24, V50 == V52, V24 == V28, V52 == V54, V28 == V56, V54 == V57, V5 == V8, V8 == V12, V12 == V16, V16 == V20, V20 == V25, V25 == V29, V29 == V58, V6 == V9, V9 == V13, V13 == V17, V17 == V21, V21 == V26, V26 == V30, V30 == V59, V10 == V14, V14 == V18, V18 == V22, V22 == V27, V27 == V31, V31 == V60, V38 == V39, V39 == V40, V40 == V41, V41 == V42, V42 == V61, V47 == V49, V49 == V51, V51 == V53, V53 == V55, V55 == V62; #6181 ), references = 2, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V0,V6), P_generate_b_nonce-{F}(V5,V8), P_generate_expiration_time-{F}(V5,V9), P_pair-{F}(V3,V5,V10), P_pair-{F}(V4,V5,V11), P_t-{F}(V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V13,V3,V15), P_key-{F}(V14,V4,V16), P_key-{F}(V17,V4,V6), P_key-{F}(V17,V3,V18), P_key-{F}(V5,V3,V18), P_generate_expiration_time-{F}(V19,V9), P_pair-{F}(V3,V19,V10), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V7,V10,V20), P_pair-{F}(V21,V7,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6335: mergings( V0 == V13, V1 == V14, V4 == V15, V2 == V20, V5 == V21, V6 == V22, V7 == V23, V8 == V24, V9 == V25, V10 == V26; #6323 ), references = 1, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_encrypt-{F}(V6,V20,V19), P_key-{F}(V20,V11,V21), P_key-{F}(V9,V11,V21), P_pair-{F}(V22,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6346: mergings( V0 == V13, V1 == V14, V4 == V15, V2 == V20, V5 == V21, V6 == V22, V7 == V23, V8 == V24, V9 == V25, V10 == V26; #6324 ), references = 1, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_encrypt-{F}(V6,V20,V19), P_key-{F}(V20,V11,V21), P_key-{F}(V9,V11,V21), P_pair-{F}(V22,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6361: mergings( V0 == V14, V1 == V15, V4 == V16, V2 == V21, V5 == V22, V6 == V23, V7 == V24, V8 == V25, V9 == V26, V10 == V27; #6349 ), references = 1, size of lhs = 29:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V0,V6), P_generate_b_nonce-{F}(V5,V8), P_generate_expiration_time-{F}(V5,V9), P_pair-{F}(V3,V5,V10), P_pair-{F}(V4,V5,V11), P_t-{F}(V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V13,V3,V15), P_key-{F}(V14,V4,V16), P_key-{F}(V17,V4,V6), P_key-{F}(V17,V3,V18), P_key-{F}(V5,V3,V18), P_generate_expiration_time-{F}(V19,V9), P_pair-{F}(V3,V19,V10), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V7,V21,V20), P_key-{F}(V21,V1,V22), P_key-{F}(V10,V12,V22), P_pair-{F}(V23,V7,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6372: mergings( V0 == V14, V1 == V15, V4 == V16, V2 == V21, V5 == V22, V6 == V23, V7 == V24, V8 == V25, V9 == V26, V10 == V27; #6350 ), references = 1, size of lhs = 29:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V0,V6), P_generate_b_nonce-{F}(V5,V8), P_generate_expiration_time-{F}(V5,V9), P_pair-{F}(V3,V5,V10), P_pair-{F}(V4,V5,V11), P_t-{F}(V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V13,V3,V15), P_key-{F}(V14,V4,V16), P_key-{F}(V17,V4,V6), P_key-{F}(V17,V3,V18), P_key-{F}(V5,V3,V18), P_generate_expiration_time-{F}(V19,V9), P_pair-{F}(V3,V19,V10), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V7,V21,V20), P_key-{F}(V21,V1,V22), P_key-{F}(V10,V12,V22), P_pair-{F}(V23,V7,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6387: mergings( V0 == V14, V1 == V15, V4 == V16, V2 == V21, V5 == V22, V6 == V23, V7 == V24, V8 == V25, V9 == V26, V10 == V27; #6375 ), references = 1, size of lhs = 29:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V0,V6), P_generate_b_nonce-{F}(V5,V8), P_generate_expiration_time-{F}(V5,V9), P_pair-{F}(V3,V5,V10), P_pair-{F}(V4,V5,V11), P_t-{F}(V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V13,V3,V15), P_key-{F}(V14,V4,V16), P_key-{F}(V17,V4,V6), P_key-{F}(V17,V3,V18), P_key-{F}(V5,V3,V18), P_generate_expiration_time-{F}(V19,V9), P_pair-{F}(V3,V19,V10), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V7,V21,V20), P_key-{F}(V21,V12,V22), P_key-{F}(V10,V1,V22), P_pair-{F}(V23,V7,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6398: mergings( V0 == V14, V1 == V15, V4 == V16, V2 == V21, V5 == V22, V6 == V23, V7 == V24, V8 == V25, V9 == V26, V10 == V27; #6376 ), references = 1, size of lhs = 29:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V0,V6), P_generate_b_nonce-{F}(V5,V8), P_generate_expiration_time-{F}(V5,V9), P_pair-{F}(V3,V5,V10), P_pair-{F}(V4,V5,V11), P_t-{F}(V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V13,V3,V15), P_key-{F}(V14,V4,V16), P_key-{F}(V17,V4,V6), P_key-{F}(V17,V3,V18), P_key-{F}(V5,V3,V18), P_generate_expiration_time-{F}(V19,V9), P_pair-{F}(V3,V19,V10), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V7,V21,V20), P_key-{F}(V21,V12,V22), P_key-{F}(V10,V1,V22), P_pair-{F}(V23,V7,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6471: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V53, V44 == V54, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V55, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V56, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V57, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V62, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V61; #6423 ), references = 2, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_pair-{F}(V4,V6,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V11,V3,V12), P_key-{F}(V13,V0,V12), P_key-{F}(V13,V1,V12), P_triple-{F}(V13,V2,V2,V14), P_key-{F}(V10,V5,V15), P_key-{F}(V11,V4,V16), P_key-{F}(V17,V4,V12), P_key-{F}(V17,V5,V18), P_key-{F}(V13,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V14), P_pair-{F}(V2,V19,V7), P_pair-{F}(V2,V20,V7), P_pair-{F}(V21,V13,V7) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6517: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61; #6424 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_triple-{F}(V6,V20,V20,V19), P_pair-{F}(V21,V6,V9), P_pair-{F}(V20,V22,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6563: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61; #6425 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_triple-{F}(V6,V20,V20,V19), P_pair-{F}(V21,V6,V9), P_pair-{F}(V20,V22,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6576: mergings( V0 == V14, V1 == V13, V4 == V15, V2 == V16, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V9 == V23, V10 == V24; #6565 ), references = 1, size of lhs = 24:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V3), P_an_a_nonce-{F}(V4), P_pair-{F}(V3,V4,V5), P_pair-{F}(V2,V4,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V9,V7,V10), P_key-{F}(V11,V0,V10), P_key-{F}(V8,V3,V12), P_key-{F}(V9,V2,V13), P_key-{F}(V14,V2,V10), P_key-{F}(V14,V3,V15), P_key-{F}(V11,V1,V15), P_generate_expiration_time-{F}(V16,V1), P_pair-{F}(V1,V16,V5), P_generate_b_nonce-{F}(V16,V17), P_encrypt-{F}(V17,V11,V5), P_pair-{F}(V1,V18,V5), P_pair-{F}(V19,V11,V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6659: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V16, V10 == V17, V16 == V23, V17 == V24, V23 == V30, V24 == V31, V30 == V37, V31 == V38, V37 == V45, V38 == V46, V45 == V52, V46 == V53, V52 == V57, V53 == V58, V7 == V11, V11 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V54, V54 == V59, V8 == V12, V12 == V19, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V55, V55 == V60, V13 == V20, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V56, V56 == V61, V15 == V22, V22 == V29, V29 == V36, V36 == V43, V43 == V51, V51 == V64, V14 == V21, V21 == V28, V28 == V35, V35 == V42, V42 == V50, V50 == V63; #6604 ), references = 2, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_pair-{F}(V2,V3,V4), P_pair-{F}(V1,V3,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V8,V6,V9), P_key-{F}(V7,V2,V10), P_key-{F}(V8,V1,V11), P_key-{F}(V12,V1,V9), P_key-{F}(V12,V2,V13), P_key-{F}(V14,V6,V13), P_key-{F}(V15,V6,V9), P_pair-{F}(V16,V15,V4), P_encrypt-{F}(V17,V14,V15), P_generate_b_nonce-{F}(V18,V17), P_generate_expiration_time-{F}(V18,V19), P_triple-{F}(V6,V14,V19,V20), P_sent-{F}(V6,V0,V20,V21), P_pair-{F}(V6,V18,V22), P_pair-{F}(V23,V3,V22), P_sent-{F}(V23,V1,V22,V21), P_pair-{F}(V20,V24,V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6712: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V16, V10 == V17, V16 == V23, V17 == V24, V23 == V30, V24 == V31, V30 == V37, V31 == V38, V37 == V45, V38 == V46, V45 == V52, V46 == V53, V52 == V57, V53 == V58, V7 == V11, V11 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V54, V54 == V59, V8 == V12, V12 == V19, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V55, V55 == V60, V13 == V20, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V56, V56 == V61, V15 == V22, V22 == V29, V29 == V36, V36 == V43, V43 == V51, V51 == V63, V14 == V21, V21 == V28, V28 == V35, V35 == V42, V42 == V50, V50 == V62; #6605 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_pair-{F}(V2,V3,V4), P_pair-{F}(V1,V3,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V2,V9), P_key-{F}(V8,V1,V10), P_key-{F}(V11,V1,V12), P_key-{F}(V11,V2,V13), P_key-{F}(V14,V6,V13), P_key-{F}(V15,V6,V12), P_pair-{F}(V16,V15,V4), P_encrypt-{F}(V17,V14,V15), P_generate_b_nonce-{F}(V18,V17), P_generate_expiration_time-{F}(V18,V19), P_triple-{F}(V6,V14,V19,V20), P_encrypt-{F}(V20,V8,V21), P_sent-{F}(V6,V0,V21,V22), P_pair-{F}(V6,V18,V23), P_pair-{F}(V24,V3,V23), P_sent-{F}(V24,V1,V23,V22), P_pair-{F}(V21,V25,V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6765: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V16, V10 == V17, V16 == V23, V17 == V24, V23 == V30, V24 == V31, V30 == V37, V31 == V38, V37 == V45, V38 == V46, V45 == V52, V46 == V53, V52 == V57, V53 == V58, V7 == V11, V11 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V54, V54 == V59, V8 == V12, V12 == V19, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V55, V55 == V60, V13 == V20, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V56, V56 == V61, V15 == V22, V22 == V29, V29 == V36, V36 == V43, V43 == V51, V51 == V63, V14 == V21, V21 == V28, V28 == V35, V35 == V42, V42 == V50, V50 == V62; #6606 ), references = 1, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_pair-{F}(V2,V3,V4), P_pair-{F}(V1,V3,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V2,V9), P_key-{F}(V8,V1,V10), P_sent-{F}(V6,V0,V11,V12), P_pair-{F}(V11,V13,V4), P_pair-{F}(V14,V15,V4), P_key-{F}(V15,V6,V16), P_key-{F}(V17,V1,V16), P_key-{F}(V17,V2,V18), P_key-{F}(V19,V6,V18), P_pair-{F}(V20,V3,V21), P_sent-{F}(V20,V1,V21,V12), P_pair-{F}(V6,V22,V21), P_generate_expiration_time-{F}(V22,V23), P_triple-{F}(V6,V19,V23,V24), P_encrypt-{F}(V24,V8,V25), P_generate_b_nonce-{F}(V22,V26), P_encrypt-{F}(V26,V19,V27), P_pair-{F}(V25,V27,V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6870: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V16, V10 == V17, V16 == V23, V17 == V24, V23 == V30, V24 == V31, V30 == V37, V31 == V38, V37 == V45, V38 == V46, V45 == V52, V46 == V53, V52 == V57, V53 == V58, V7 == V11, V11 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V54, V54 == V59, V8 == V12, V12 == V19, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V55, V55 == V60, V13 == V20, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V56, V56 == V61, V15 == V22, V22 == V29, V29 == V36, V36 == V43, V43 == V51, V51 == V63, V14 == V21, V21 == V28, V28 == V35, V35 == V42, V42 == V50, V50 == V62; #6815 ), references = 2, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_pair-{F}(V2,V3,V4), P_pair-{F}(V1,V3,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V2,V9), P_key-{F}(V8,V1,V10), P_sent-{F}(V6,V0,V11,V12), P_pair-{F}(V11,V13,V4), P_key-{F}(V14,V1,V15), P_key-{F}(V14,V2,V16), P_key-{F}(V17,V6,V16), P_key-{F}(V18,V6,V15), P_pair-{F}(V19,V18,V4), P_encrypt-{F}(V20,V8,V18), P_triple-{F}(V6,V17,V21,V20), P_generate_expiration_time-{F}(V22,V21), P_pair-{F}(V6,V22,V23), P_pair-{F}(V24,V3,V23), P_sent-{F}(V24,V1,V23,V12), P_generate_b_nonce-{F}(V22,V25), P_encrypt-{F}(V25,V17,V18) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6923: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V16, V10 == V17, V16 == V23, V17 == V24, V23 == V30, V24 == V31, V30 == V37, V31 == V38, V37 == V45, V38 == V46, V45 == V52, V46 == V53, V52 == V57, V53 == V58, V7 == V11, V11 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V54, V54 == V59, V8 == V12, V12 == V19, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V55, V55 == V60, V13 == V20, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V56, V56 == V61, V15 == V22, V22 == V29, V29 == V36, V36 == V43, V43 == V51, V51 == V63, V14 == V21, V21 == V28, V28 == V35, V35 == V42, V42 == V50, V50 == V62; #6816 ), references = 2, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_pair-{F}(V2,V3,V4), P_pair-{F}(V1,V3,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V2,V9), P_key-{F}(V8,V1,V10), P_sent-{F}(V6,V0,V11,V12), P_pair-{F}(V11,V13,V4), P_key-{F}(V14,V1,V15), P_key-{F}(V14,V2,V16), P_key-{F}(V17,V6,V16), P_key-{F}(V18,V6,V15), P_pair-{F}(V19,V18,V4), P_encrypt-{F}(V20,V8,V18), P_triple-{F}(V6,V17,V21,V20), P_generate_expiration_time-{F}(V22,V21), P_pair-{F}(V6,V22,V23), P_pair-{F}(V24,V3,V23), P_sent-{F}(V24,V1,V23,V12), P_generate_b_nonce-{F}(V22,V25), P_encrypt-{F}(V25,V17,V18) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #6976: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V16, V10 == V17, V16 == V23, V17 == V24, V23 == V30, V24 == V31, V30 == V37, V31 == V38, V37 == V45, V38 == V46, V45 == V52, V46 == V53, V52 == V57, V53 == V58, V7 == V11, V11 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V54, V54 == V59, V8 == V12, V12 == V19, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V55, V55 == V60, V13 == V20, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V56, V56 == V61, V15 == V22, V22 == V29, V29 == V36, V36 == V43, V43 == V51, V51 == V63, V14 == V21, V21 == V28, V28 == V35, V35 == V42, V42 == V50, V50 == V62; #6817 ), references = 2, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_pair-{F}(V2,V3,V4), P_pair-{F}(V1,V3,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V2,V9), P_key-{F}(V8,V1,V10), P_key-{F}(V11,V6,V12), P_key-{F}(V13,V1,V12), P_key-{F}(V13,V2,V14), P_key-{F}(V15,V6,V14), P_pair-{F}(V16,V11,V4), P_pair-{F}(V17,V3,V18), P_sent-{F}(V17,V1,V18,V19), P_pair-{F}(V6,V20,V18), P_generate_expiration_time-{F}(V20,V21), P_triple-{F}(V6,V15,V21,V22), P_encrypt-{F}(V22,V8,V23), P_generate_b_nonce-{F}(V20,V24), P_encrypt-{F}(V24,V15,V25), P_pair-{F}(V23,V25,V26), P_sent-{F}(V6,V0,V26,V19), P_pair-{F}(V26,V27,V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7070: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V53, V44 == V54, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V55, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V56, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V57, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V62, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V61; #7022 ), references = 2, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_pair-{F}(V4,V6,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V11,V3,V12), P_key-{F}(V13,V0,V12), P_key-{F}(V13,V1,V12), P_quadruple-{F}(V13,V13,V2,V13,V14), P_key-{F}(V10,V5,V15), P_key-{F}(V11,V4,V16), P_key-{F}(V17,V4,V12), P_key-{F}(V17,V5,V18), P_key-{F}(V13,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V14), P_pair-{F}(V2,V19,V7), P_pair-{F}(V2,V20,V7), P_pair-{F}(V21,V13,V7) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7116: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61; #7023 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_quadruple-{F}(V6,V6,V20,V6,V19), P_pair-{F}(V21,V6,V9), P_pair-{F}(V20,V22,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7162: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61; #7024 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_quadruple-{F}(V6,V6,V20,V6,V19), P_pair-{F}(V21,V6,V9), P_pair-{F}(V20,V22,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7179: mergings( V0 == V15, V1 == V14, V4 == V16, V2 == V17, V5 == V18, V6 == V19, V7 == V20, V8 == V21, V9 == V25, V10 == V26; #7166 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V8,V11), P_key-{F}(V12,V0,V11), P_key-{F}(V12,V1,V11), P_triple-{F}(V12,V2,V2,V13), P_key-{F}(V9,V4,V14), P_key-{F}(V10,V3,V15), P_key-{F}(V16,V3,V11), P_key-{F}(V16,V4,V17), P_key-{F}(V12,V2,V17), P_generate_expiration_time-{F}(V18,V2), P_generate_b_nonce-{F}(V18,V13), P_pair-{F}(V2,V18,V6), P_pair-{F}(V2,V19,V6), P_pair-{F}(V20,V12,V6) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7190: mergings( V0 == V15, V1 == V14, V4 == V16, V2 == V17, V5 == V18, V6 == V19, V7 == V20, V8 == V21, V9 == V25, V10 == V26; #7167 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V8,V11), P_key-{F}(V12,V0,V11), P_key-{F}(V12,V1,V11), P_quadruple-{F}(V12,V12,V2,V12,V13), P_key-{F}(V9,V4,V14), P_key-{F}(V10,V3,V15), P_key-{F}(V16,V3,V11), P_key-{F}(V16,V4,V17), P_key-{F}(V12,V2,V17), P_generate_expiration_time-{F}(V18,V2), P_generate_b_nonce-{F}(V18,V13), P_pair-{F}(V2,V18,V6), P_pair-{F}(V2,V19,V6), P_pair-{F}(V20,V12,V6) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7201: mergings( V0 == V14, V1 == V13, V4 == V15, V2 == V16, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V9 == V24, V10 == V25; #7168 ), references = 1, size of lhs = 25:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V3), P_an_a_nonce-{F}(V4), P_pair-{F}(V3,V4,V5), P_pair-{F}(V2,V4,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V9,V7,V10), P_key-{F}(V11,V0,V10), P_triple-{F}(V11,V11,V11,V12), P_key-{F}(V8,V3,V13), P_key-{F}(V9,V2,V14), P_key-{F}(V15,V2,V10), P_key-{F}(V15,V3,V16), P_key-{F}(V11,V1,V16), P_generate_expiration_time-{F}(V17,V1), P_pair-{F}(V1,V17,V5), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V11,V12), P_pair-{F}(V1,V19,V5), P_pair-{F}(V20,V11,V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7274: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V53, V44 == V54, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V55, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V56, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V57, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V62, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V61; #7226 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_pair-{F}(V4,V6,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V11,V3,V12), P_key-{F}(V13,V0,V12), P_key-{F}(V13,V1,V12), P_quadruple-{F}(V13,V2,V13,V13,V14), P_key-{F}(V10,V5,V15), P_key-{F}(V11,V4,V16), P_key-{F}(V17,V4,V12), P_key-{F}(V17,V5,V18), P_key-{F}(V13,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V14), P_pair-{F}(V2,V19,V7), P_pair-{F}(V2,V20,V7), P_pair-{F}(V21,V13,V7) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7320: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61; #7227 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_quadruple-{F}(V6,V20,V6,V6,V19), P_pair-{F}(V21,V6,V9), P_pair-{F}(V20,V22,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7366: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61; #7228 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_quadruple-{F}(V6,V20,V6,V6,V19), P_pair-{F}(V21,V6,V9), P_pair-{F}(V20,V22,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7384: mergings( V0 == V12, V1 == V11, V4 == V13, V2 == V14, V5 == V15, V6 == V16, V7 == V17, V8 == V18, V9 == V22, V10 == V23, V19 == V25; #7370 ), references = 1, size of lhs = 22:
% 242.91/243.11     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_pair-{F}(V0,V2,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V7,V5,V8), P_key-{F}(V6,V1,V9), P_key-{F}(V7,V0,V10), P_key-{F}(V11,V0,V8), P_key-{F}(V11,V1,V8), P_key-{F}(V12,V5,V8), P_pair-{F}(V12,V12,V13), P_generate_expiration_time-{F}(V14,V13), P_pair-{F}(V5,V14,V3), P_generate_b_nonce-{F}(V14,V15), P_encrypt-{F}(V15,V12,V5), P_pair-{F}(V5,V16,V3), P_pair-{F}(V17,V12,V3) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7396: mergings( V0 == V12, V1 == V11, V4 == V13, V2 == V14, V5 == V15, V6 == V16, V7 == V17, V8 == V18, V9 == V20, V10 == V21, V19 == V23; #7371 ), references = 1, size of lhs = 22:
% 242.91/243.11     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_pair-{F}(V0,V2,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V7,V5,V8), P_key-{F}(V6,V1,V9), P_key-{F}(V7,V0,V10), P_key-{F}(V11,V0,V8), P_key-{F}(V11,V1,V8), P_pair-{F}(V5,V12,V3), P_generate_expiration_time-{F}(V12,V13), P_generate_b_nonce-{F}(V12,V14), P_encrypt-{F}(V14,V15,V15), P_key-{F}(V15,V5,V8), P_pair-{F}(V15,V15,V13), P_pair-{F}(V5,V16,V3), P_pair-{F}(V17,V15,V3) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7408: mergings( V0 == V12, V1 == V11, V4 == V13, V2 == V14, V5 == V15, V6 == V16, V7 == V17, V8 == V18, V9 == V20, V10 == V21, V19 == V23; #7372 ), references = 1, size of lhs = 22:
% 242.91/243.11     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_pair-{F}(V0,V2,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V7,V5,V8), P_key-{F}(V6,V1,V9), P_key-{F}(V7,V0,V10), P_key-{F}(V11,V0,V8), P_key-{F}(V11,V1,V8), P_pair-{F}(V5,V12,V3), P_generate_expiration_time-{F}(V12,V13), P_generate_b_nonce-{F}(V12,V14), P_encrypt-{F}(V14,V15,V15), P_key-{F}(V15,V5,V8), P_pair-{F}(V15,V5,V13), P_pair-{F}(V5,V16,V3), P_pair-{F}(V17,V15,V3) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7467: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V38, V29 == V39, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V40, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V41, V13 == V18, V18 == V25, V25 == V32, V32 == V42, V20 == V27, V27 == V34, V34 == V45, V19 == V26, V26 == V33, V33 == V44; #7433 ), references = 1, size of lhs = 25:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V1,V11), P_key-{F}(V9,V4,V12), P_key-{F}(V10,V3,V13), P_key-{F}(V14,V3,V11), P_key-{F}(V14,V4,V15), P_key-{F}(V16,V2,V15), P_pair-{F}(V2,V17,V6), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V16,V19), P_key-{F}(V19,V0,V11), P_generate_expiration_time-{F}(V17,V20), P_triple-{F}(V2,V16,V20,V6), P_pair-{F}(V21,V19,V6) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7520: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V42, V36 == V43, V42 == V50, V43 == V51, V50 == V61, V51 == V62, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V44, V44 == V52, V52 == V63, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V45, V45 == V53, V53 == V64, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V46, V46 == V54, V54 == V65, V20 == V27, V27 == V34, V34 == V41, V41 == V48, V48 == V56, V56 == V67, V19 == V26, V26 == V33, V33 == V40, V40 == V47, V47 == V55, V55 == V66; #7434 ), references = 1, size of lhs = 31:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_generate_b_nonce-{F}(V5,V6), P_generate_expiration_time-{F}(V5,V7), P_pair-{F}(V4,V5,V8), P_pair-{F}(V3,V5,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V11,V4,V13), P_key-{F}(V12,V3,V14), P_pair-{F}(V2,V15,V8), P_generate_expiration_time-{F}(V15,V16), P_generate_b_nonce-{F}(V15,V17), P_sent-{F}(V10,V1,V18,V19), P_pair-{F}(V18,V20,V8), P_key-{F}(V21,V3,V22), P_key-{F}(V21,V4,V23), P_key-{F}(V24,V2,V23), P_triple-{F}(V2,V24,V16,V25), P_encrypt-{F}(V17,V24,V26), P_key-{F}(V26,V0,V22), P_pair-{F}(V27,V26,V8), P_triple-{F}(V28,V5,V7,V25), P_pair-{F}(V28,V5,V29), P_sent-{F}(V28,V3,V29,V19) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7573: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V42, V36 == V43, V42 == V50, V43 == V51, V50 == V61, V51 == V62, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V44, V44 == V52, V52 == V63, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V45, V45 == V53, V53 == V64, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V46, V46 == V54, V54 == V65, V20 == V27, V27 == V34, V34 == V41, V41 == V48, V48 == V56, V56 == V67, V19 == V26, V26 == V33, V33 == V40, V40 == V47, V47 == V55, V55 == V66; #7435 ), references = 1, size of lhs = 31:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_generate_b_nonce-{F}(V5,V6), P_generate_expiration_time-{F}(V5,V7), P_pair-{F}(V4,V5,V8), P_pair-{F}(V3,V5,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V11,V4,V13), P_key-{F}(V12,V3,V14), P_pair-{F}(V2,V15,V8), P_generate_expiration_time-{F}(V15,V16), P_generate_b_nonce-{F}(V15,V17), P_sent-{F}(V10,V1,V18,V19), P_pair-{F}(V18,V20,V8), P_key-{F}(V21,V3,V22), P_key-{F}(V21,V4,V23), P_key-{F}(V24,V2,V23), P_triple-{F}(V2,V24,V16,V25), P_encrypt-{F}(V17,V24,V26), P_key-{F}(V26,V0,V22), P_pair-{F}(V27,V26,V8), P_triple-{F}(V28,V5,V7,V25), P_pair-{F}(V28,V5,V29), P_sent-{F}(V28,V3,V29,V19) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7612: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V40, V29 == V41, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V42, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V43, V13 == V18, V18 == V25, V25 == V32, V32 == V44, V20 == V27, V27 == V34, V34 == V47, V19 == V26, V26 == V33, V33 == V46; #7580 ), references = 1, size of lhs = 29:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_generate_b_nonce-{F}(V5,V6), P_generate_expiration_time-{F}(V5,V7), P_pair-{F}(V4,V5,V8), P_pair-{F}(V3,V5,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V12,V1,V13), P_key-{F}(V11,V4,V14), P_key-{F}(V12,V3,V15), P_key-{F}(V16,V3,V13), P_key-{F}(V16,V4,V17), P_key-{F}(V18,V2,V17), P_pair-{F}(V2,V19,V8), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V20,V18,V21), P_key-{F}(V21,V0,V13), P_generate_expiration_time-{F}(V19,V22), P_triple-{F}(V2,V18,V22,V23), P_triple-{F}(V4,V5,V7,V24), P_encrypt-{F}(V24,V12,V23), P_pair-{F}(V25,V21,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7625: mergings( V0 == V12, V1 == V11, V4 == V13, V2 == V14, V5 == V15, V6 == V16, V7 == V17, V8 == V18, V9 == V20, V10 == V21; #7614 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_pair-{F}(V0,V2,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V7,V5,V8), P_key-{F}(V6,V1,V9), P_key-{F}(V7,V0,V10), P_key-{F}(V11,V0,V8), P_key-{F}(V11,V1,V12), P_key-{F}(V13,V5,V12), P_key-{F}(V14,V5,V8), P_pair-{F}(V15,V14,V3), P_encrypt-{F}(V16,V13,V14), P_generate_b_nonce-{F}(V17,V16), P_generate_expiration_time-{F}(V17,V18), P_triple-{F}(V5,V13,V18,V19), P_sent-{F}(V5,V5,V19,V20), P_pair-{F}(V5,V17,V21), P_pair-{F}(V22,V2,V21), P_sent-{F}(V22,V0,V21,V20), P_pair-{F}(V19,V23,V3) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7698: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V54, V44 == V55, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V56, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V57, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V58, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V62, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V61; #7650 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_triple-{F}(V2,V2,V2,V3), party_of_protocol-{F}(V4), party_of_protocol-{F}(V5), P_b-{F}(V5), P_a-{F}(V6), P_an_a_nonce-{F}(V7), P_pair-{F}(V6,V7,V8), P_pair-{F}(V5,V7,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V12,V4,V13), P_key-{F}(V14,V0,V13), P_key-{F}(V14,V1,V13), P_key-{F}(V11,V6,V15), P_key-{F}(V12,V5,V16), P_key-{F}(V17,V5,V13), P_key-{F}(V17,V6,V18), P_key-{F}(V14,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V3), P_pair-{F}(V2,V19,V8), P_pair-{F}(V2,V20,V8), P_pair-{F}(V21,V14,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7744: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61; #7651 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_triple-{F}(V20,V20,V20,V19), P_pair-{F}(V21,V6,V9), P_pair-{F}(V20,V22,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7790: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61; #7652 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_triple-{F}(V20,V20,V20,V19), P_pair-{F}(V21,V6,V9), P_pair-{F}(V20,V22,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7807: mergings( V0 == V11, V1 == V12, V4 == V13, V2 == V16, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V9 == V21, V10 == V22; #7794 ), references = 1, size of lhs = 24:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_generate_b_nonce-{F}(V2,V3), P_generate_expiration_time-{F}(V2,V4), P_pair-{F}(V0,V2,V5), P_pair-{F}(V1,V2,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V8,V0,V10), P_key-{F}(V9,V1,V11), P_key-{F}(V2,V0,V12), P_key-{F}(V13,V0,V12), P_key-{F}(V13,V1,V14), P_key-{F}(V5,V7,V14), P_key-{F}(V15,V7,V14), P_encrypt-{F}(V5,V15,V16), P_generate_expiration_time-{F}(V17,V4), P_pair-{F}(V0,V17,V5), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V2,V16) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7818: mergings( V0 == V11, V1 == V12, V4 == V13, V2 == V16, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V9 == V21, V10 == V22; #7795 ), references = 1, size of lhs = 24:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_generate_b_nonce-{F}(V2,V3), P_generate_expiration_time-{F}(V2,V4), P_pair-{F}(V0,V2,V5), P_pair-{F}(V1,V2,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V8,V0,V10), P_key-{F}(V9,V1,V11), P_key-{F}(V2,V0,V12), P_key-{F}(V13,V0,V12), P_key-{F}(V13,V1,V14), P_key-{F}(V5,V7,V14), P_key-{F}(V15,V7,V14), P_encrypt-{F}(V5,V15,V16), P_generate_expiration_time-{F}(V17,V4), P_pair-{F}(V0,V17,V5), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V2,V16) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7829: mergings( V0 == V11, V1 == V12, V4 == V13, V2 == V16, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V9 == V21, V10 == V22; #7796 ), references = 1, size of lhs = 24:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_generate_b_nonce-{F}(V2,V3), P_generate_expiration_time-{F}(V2,V4), P_pair-{F}(V0,V2,V5), P_pair-{F}(V1,V2,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V8,V0,V10), P_key-{F}(V9,V1,V11), P_key-{F}(V2,V0,V12), P_key-{F}(V13,V0,V12), P_key-{F}(V13,V1,V14), P_key-{F}(V5,V7,V14), P_key-{F}(V15,V7,V14), P_encrypt-{F}(V5,V15,V16), P_generate_expiration_time-{F}(V17,V4), P_pair-{F}(V0,V17,V5), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V2,V16) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7926: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V53, V44 == V54, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V55, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V56, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V57, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V62, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V61; #7878 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_pair-{F}(V4,V6,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V11,V3,V12), P_key-{F}(V13,V0,V12), P_key-{F}(V13,V1,V12), P_quadruple-{F}(V13,V2,V2,V2,V14), P_key-{F}(V10,V5,V15), P_key-{F}(V11,V4,V16), P_key-{F}(V17,V4,V12), P_key-{F}(V17,V5,V18), P_key-{F}(V13,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V14), P_pair-{F}(V2,V19,V7), P_pair-{F}(V2,V20,V7), P_pair-{F}(V21,V13,V7) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #7972: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61; #7879 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_quadruple-{F}(V6,V20,V20,V20,V19), P_pair-{F}(V21,V6,V9), P_pair-{F}(V20,V22,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8018: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61; #7880 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_quadruple-{F}(V6,V20,V20,V20,V19), P_pair-{F}(V21,V6,V9), P_pair-{F}(V20,V22,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8031: mergings( V0 == V14, V1 == V13, V4 == V15, V2 == V16, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V9 == V24, V10 == V25; #8020 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V3), P_an_a_nonce-{F}(V4), P_pair-{F}(V3,V4,V5), P_pair-{F}(V2,V4,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V9,V7,V10), P_key-{F}(V11,V0,V10), P_key-{F}(V12,V7,V10), P_key-{F}(V8,V3,V13), P_key-{F}(V9,V2,V14), P_key-{F}(V15,V2,V10), P_key-{F}(V15,V3,V16), P_key-{F}(V11,V1,V16), P_generate_expiration_time-{F}(V17,V1), P_pair-{F}(V1,V17,V5), P_generate_b_nonce-{F}(V17,V18), P_encrypt-{F}(V18,V11,V19), P_encrypt-{F}(V5,V12,V19), P_pair-{F}(V1,V20,V5), P_pair-{F}(V21,V11,V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8048: mergings( V0 == V12, V1 == V11, V4 == V13, V2 == V14, V5 == V15, V6 == V16, V7 == V17, V8 == V18, V9 == V19, V10 == V20; #8035 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_pair-{F}(V0,V2,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V6,V1,V8), P_key-{F}(V7,V0,V9), P_sent-{F}(V5,V5,V10,V11), P_pair-{F}(V10,V12,V3), P_key-{F}(V13,V0,V14), P_key-{F}(V13,V1,V15), P_key-{F}(V16,V5,V15), P_key-{F}(V17,V5,V14), P_pair-{F}(V18,V17,V3), P_encrypt-{F}(V19,V7,V17), P_triple-{F}(V5,V16,V20,V19), P_generate_expiration_time-{F}(V21,V20), P_pair-{F}(V5,V21,V22), P_pair-{F}(V23,V2,V22), P_sent-{F}(V23,V0,V22,V11), P_generate_b_nonce-{F}(V21,V24), P_encrypt-{F}(V24,V16,V17) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8059: mergings( V0 == V12, V1 == V11, V4 == V13, V2 == V14, V5 == V15, V6 == V16, V7 == V17, V8 == V18, V9 == V19, V10 == V20; #8036 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_pair-{F}(V0,V2,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V6,V1,V8), P_key-{F}(V7,V0,V9), P_sent-{F}(V5,V5,V10,V11), P_pair-{F}(V10,V12,V3), P_key-{F}(V13,V0,V14), P_key-{F}(V13,V1,V15), P_key-{F}(V16,V5,V15), P_key-{F}(V17,V5,V14), P_pair-{F}(V18,V17,V3), P_encrypt-{F}(V19,V7,V17), P_triple-{F}(V5,V16,V20,V19), P_generate_expiration_time-{F}(V21,V20), P_pair-{F}(V5,V21,V22), P_pair-{F}(V23,V2,V22), P_sent-{F}(V23,V0,V22,V11), P_generate_b_nonce-{F}(V21,V24), P_encrypt-{F}(V24,V16,V17) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8070: mergings( V0 == V12, V1 == V11, V4 == V13, V2 == V14, V5 == V15, V6 == V16, V7 == V17, V8 == V18, V9 == V19, V10 == V20; #8037 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_pair-{F}(V0,V2,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V6,V1,V8), P_key-{F}(V7,V0,V9), P_key-{F}(V10,V5,V11), P_key-{F}(V12,V0,V11), P_key-{F}(V12,V1,V13), P_key-{F}(V14,V5,V13), P_pair-{F}(V15,V10,V3), P_pair-{F}(V16,V2,V17), P_sent-{F}(V16,V0,V17,V18), P_pair-{F}(V5,V19,V17), P_generate_expiration_time-{F}(V19,V20), P_triple-{F}(V5,V14,V20,V21), P_encrypt-{F}(V21,V7,V22), P_generate_b_nonce-{F}(V19,V23), P_encrypt-{F}(V23,V14,V24), P_pair-{F}(V22,V24,V25), P_sent-{F}(V5,V5,V25,V18), P_pair-{F}(V25,V26,V3) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8154: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V50, V44 == V51, V50 == V66, V51 == V67, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V52, V52 == V68, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V53, V53 == V69, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V54, V54 == V70, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V55, V55 == V71, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V56, V56 == V72; #8099 ), references = 2, size of lhs = 29:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V0,V6), P_generate_b_nonce-{F}(V5,V8), P_generate_expiration_time-{F}(V5,V9), P_pair-{F}(V3,V5,V10), P_pair-{F}(V4,V5,V11), P_t-{F}(V12), P_key-{F}(V7,V12,V13), P_key-{F}(V14,V1,V13), P_encrypt-{F}(V7,V14,V15), P_at-{F}(V16), P_bt-{F}(V17), P_key-{F}(V16,V3,V18), P_key-{F}(V17,V4,V19), P_key-{F}(V20,V4,V6), P_key-{F}(V20,V3,V21), P_key-{F}(V5,V3,V21), P_generate_expiration_time-{F}(V22,V9), P_generate_b_nonce-{F}(V22,V15), P_pair-{F}(V3,V22,V10), P_pair-{F}(V23,V7,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8207: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V50, V44 == V51, V50 == V66, V51 == V67, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V52, V52 == V68, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V53, V53 == V69, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V54, V54 == V70, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V55, V55 == V71, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V56, V56 == V72; #8100 ), references = 2, size of lhs = 29:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V0,V6), P_generate_b_nonce-{F}(V5,V8), P_generate_expiration_time-{F}(V5,V9), P_pair-{F}(V3,V5,V10), P_pair-{F}(V4,V5,V11), P_t-{F}(V12), P_key-{F}(V7,V12,V13), P_key-{F}(V14,V1,V13), P_encrypt-{F}(V7,V14,V15), P_at-{F}(V16), P_bt-{F}(V17), P_key-{F}(V16,V3,V18), P_key-{F}(V17,V4,V19), P_key-{F}(V20,V4,V6), P_key-{F}(V20,V3,V21), P_key-{F}(V5,V3,V21), P_generate_expiration_time-{F}(V22,V9), P_generate_b_nonce-{F}(V22,V15), P_pair-{F}(V3,V22,V10), P_pair-{F}(V23,V7,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8267: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V42, V36 == V43, V42 == V50, V43 == V51, V50 == V57, V51 == V58, V57 == V73, V58 == V74, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V44, V44 == V52, V52 == V59, V59 == V75, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V45, V45 == V53, V53 == V60, V60 == V76, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V46, V46 == V54, V54 == V61, V61 == V77, V20 == V27, V27 == V34, V34 == V41, V41 == V48, V48 == V56, V56 == V63, V63 == V79, V19 == V26, V26 == V33, V33 == V40, V40 == V47, V47 == V55, V55 == V62, V62 == V78; #8101 ), references = 1, size of lhs = 30:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_key-{F}(V3,V2,V4), P_key-{F}(V5,V1,V4), party_of_protocol-{F}(V6), party_of_protocol-{F}(V7), P_b-{F}(V7), P_a-{F}(V8), P_an_a_nonce-{F}(V9), P_pair-{F}(V8,V9,V10), P_pair-{F}(V7,V9,V11), P_t-{F}(V12), P_key-{F}(V13,V12,V4), P_key-{F}(V13,V0,V14), P_encrypt-{F}(V13,V5,V15), P_at-{F}(V16), P_bt-{F}(V17), P_key-{F}(V17,V6,V14), P_key-{F}(V16,V8,V18), P_key-{F}(V17,V7,V19), P_key-{F}(V20,V7,V4), P_key-{F}(V20,V8,V21), P_key-{F}(V3,V3,V21), P_generate_expiration_time-{F}(V22,V3), P_generate_b_nonce-{F}(V22,V15), P_pair-{F}(V3,V22,V10), P_pair-{F}(V3,V23,V10), P_pair-{F}(V24,V13,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8284: mergings( V0 == V13, V1 == V14, V4 == V15, V2 == V22, V5 == V23, V6 == V24, V7 == V25, V8 == V26, V9 == V27, V10 == V28; #8271 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_key-{F}(V12,V11,V5), P_encrypt-{F}(V6,V12,V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V2,V16), P_key-{F}(V15,V3,V17), P_key-{F}(V18,V3,V5), P_key-{F}(V18,V2,V19), P_key-{F}(V4,V2,V19), P_generate_expiration_time-{F}(V20,V8), P_generate_b_nonce-{F}(V20,V13), P_pair-{F}(V2,V20,V9), P_pair-{F}(V21,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8295: mergings( V0 == V13, V1 == V14, V4 == V15, V2 == V22, V5 == V23, V6 == V24, V7 == V25, V8 == V26, V9 == V27, V10 == V28; #8272 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_key-{F}(V12,V11,V5), P_encrypt-{F}(V6,V12,V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V2,V16), P_key-{F}(V15,V3,V17), P_key-{F}(V18,V3,V5), P_key-{F}(V18,V2,V19), P_key-{F}(V4,V2,V19), P_generate_expiration_time-{F}(V20,V8), P_generate_b_nonce-{F}(V20,V13), P_pair-{F}(V2,V20,V9), P_pair-{F}(V21,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8310: mergings( V0 == V13, V1 == V14, V4 == V15, V2 == V20, V5 == V21, V6 == V22, V7 == V26, V8 == V27, V9 == V28, V10 == V29; #8298 ), references = 1, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_key-{F}(V6,V11,V12), P_key-{F}(V13,V11,V12), P_encrypt-{F}(V6,V13,V14), P_at-{F}(V15), P_bt-{F}(V16), P_key-{F}(V15,V2,V17), P_key-{F}(V16,V3,V18), P_key-{F}(V19,V3,V5), P_key-{F}(V19,V2,V20), P_key-{F}(V4,V2,V20), P_generate_expiration_time-{F}(V21,V8), P_generate_b_nonce-{F}(V21,V14), P_pair-{F}(V2,V21,V9), P_pair-{F}(V22,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8321: mergings( V0 == V13, V1 == V14, V4 == V15, V2 == V20, V5 == V21, V6 == V22, V7 == V26, V8 == V27, V9 == V28, V10 == V29; #8299 ), references = 1, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_key-{F}(V6,V11,V12), P_key-{F}(V13,V11,V12), P_encrypt-{F}(V6,V13,V14), P_at-{F}(V15), P_bt-{F}(V16), P_key-{F}(V15,V2,V17), P_key-{F}(V16,V3,V18), P_key-{F}(V19,V3,V5), P_key-{F}(V19,V2,V20), P_key-{F}(V4,V2,V20), P_generate_expiration_time-{F}(V21,V8), P_generate_b_nonce-{F}(V21,V14), P_pair-{F}(V2,V21,V9), P_pair-{F}(V22,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8394: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V53, V44 == V54, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V55, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V56, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V57, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V62, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V61; #8346 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_pair-{F}(V4,V6,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V11,V3,V12), P_key-{F}(V13,V0,V12), P_key-{F}(V13,V1,V12), P_quadruple-{F}(V13,V13,V13,V2,V14), P_key-{F}(V10,V5,V15), P_key-{F}(V11,V4,V16), P_key-{F}(V17,V4,V12), P_key-{F}(V17,V5,V18), P_key-{F}(V13,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V14), P_pair-{F}(V2,V19,V7), P_pair-{F}(V2,V20,V7), P_pair-{F}(V21,V13,V7) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8440: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61; #8347 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_quadruple-{F}(V6,V6,V6,V20,V19), P_pair-{F}(V21,V6,V9), P_pair-{F}(V20,V22,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8486: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61; #8348 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_quadruple-{F}(V6,V6,V6,V20,V19), P_pair-{F}(V21,V6,V9), P_pair-{F}(V20,V22,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8588: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V16, V10 == V17, V16 == V23, V17 == V24, V23 == V30, V24 == V31, V30 == V37, V31 == V38, V37 == V45, V38 == V46, V45 == V52, V46 == V53, V52 == V61, V53 == V62, V7 == V11, V11 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V54, V54 == V63, V8 == V12, V12 == V19, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V55, V55 == V64, V13 == V20, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V56, V56 == V65, V15 == V22, V22 == V29, V29 == V36, V36 == V43, V43 == V51, V51 == V69, V14 == V21, V21 == V28, V28 == V35, V35 == V42, V42 == V50, V50 == V68; #8533 ), references = 1, size of lhs = 29:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_pair-{F}(V4,V6,V8), P_t-{F}(V9), P_sent-{F}(V9,V9,V2,V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V12,V3,V13), P_key-{F}(V14,V0,V13), P_key-{F}(V14,V1,V13), P_key-{F}(V11,V5,V15), P_key-{F}(V12,V4,V16), P_key-{F}(V17,V4,V13), P_key-{F}(V17,V5,V18), P_key-{F}(V14,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V7), P_pair-{F}(V2,V20,V7), P_pair-{F}(V21,V14,V7), P_pair-{F}(V2,V19,V22), P_pair-{F}(V23,V6,V22), P_sent-{F}(V23,V4,V22,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8641: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V16, V10 == V17, V16 == V23, V17 == V24, V23 == V30, V24 == V31, V30 == V37, V31 == V38, V37 == V45, V38 == V46, V45 == V52, V46 == V53, V52 == V62, V53 == V63, V7 == V11, V11 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V54, V54 == V64, V8 == V12, V12 == V19, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V55, V55 == V65, V13 == V20, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V56, V56 == V66, V14 == V21, V21 == V28, V28 == V35, V35 == V42, V42 == V50, V50 == V67, V15 == V22, V22 == V29, V29 == V36, V36 == V43, V43 == V51, V51 == V68; #8534 ), references = 1, size of lhs = 29:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V9), P_pair-{F}(V19,V6,V9), P_pair-{F}(V2,V18,V20), P_pair-{F}(V21,V4,V20), P_sent-{F}(V21,V3,V20,V22), P_sent-{F}(V11,V11,V23,V22), P_pair-{F}(V23,V24,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8694: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V16, V10 == V17, V16 == V23, V17 == V24, V23 == V30, V24 == V31, V30 == V37, V31 == V38, V37 == V45, V38 == V46, V45 == V52, V46 == V53, V52 == V62, V53 == V63, V7 == V11, V11 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V54, V54 == V64, V8 == V12, V12 == V19, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V55, V55 == V65, V13 == V20, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V56, V56 == V66, V14 == V21, V21 == V28, V28 == V35, V35 == V42, V42 == V50, V50 == V67, V15 == V22, V22 == V29, V29 == V36, V36 == V43, V43 == V51, V51 == V68; #8535 ), references = 1, size of lhs = 29:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V9), P_pair-{F}(V19,V6,V9), P_pair-{F}(V2,V18,V20), P_pair-{F}(V21,V4,V20), P_sent-{F}(V21,V3,V20,V22), P_sent-{F}(V11,V11,V23,V22), P_pair-{F}(V23,V24,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8710: mergings( V0 == V12, V1 == V12, V2 == V5, V4 == V13, V6 == V14, V7 == V15, V8 == V16, V9 == V17, V10 == V18; #8698 ), references = 1, size of lhs = 19:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V1), party_of_protocol-{F}(V1), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_t-{F}(V4), P_at-{F}(V5), P_bt-{F}(V6), P_key-{F}(V5,V1,V7), P_key-{F}(V6,V1,V8), P_key-{F}(V2,V1,V9), P_key-{F}(V2,V0,V9), P_key-{F}(V10,V1,V9), P_key-{F}(V11,V4,V9), P_encrypt-{F}(V2,V11,V12), P_generate_expiration_time-{F}(V2,V13), P_generate_b_nonce-{F}(V2,V14), P_encrypt-{F}(V14,V2,V12) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8720: mergings( V0 == V12, V1 == V12, V2 == V5, V4 == V13, V6 == V14, V7 == V15, V8 == V16, V9 == V17, V10 == V18; #8699 ), references = 1, size of lhs = 19:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V1), party_of_protocol-{F}(V1), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_t-{F}(V4), P_at-{F}(V5), P_bt-{F}(V6), P_key-{F}(V5,V1,V7), P_key-{F}(V6,V1,V8), P_key-{F}(V2,V1,V9), P_key-{F}(V2,V0,V9), P_key-{F}(V10,V1,V9), P_key-{F}(V11,V4,V9), P_encrypt-{F}(V2,V11,V12), P_generate_expiration_time-{F}(V2,V13), P_generate_b_nonce-{F}(V2,V14), P_encrypt-{F}(V14,V2,V12) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8730: mergings( V0 == V13, V1 == V13, V2 == V5, V4 == V14, V6 == V15, V7 == V16, V8 == V17, V9 == V21, V10 == V22; #8700 ), references = 1, size of lhs = 21:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_expiration_time-{F}(V3,V2), P_pair-{F}(V2,V3,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V7,V1,V8), P_key-{F}(V3,V0,V8), P_key-{F}(V3,V2,V8), P_key-{F}(V9,V5,V8), P_encrypt-{F}(V3,V9,V10), P_key-{F}(V6,V2,V11), P_key-{F}(V7,V2,V12), P_key-{F}(V13,V2,V8), P_generate_b_nonce-{F}(V3,V14), P_encrypt-{F}(V14,V3,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8813: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V42, V36 == V43, V42 == V50, V43 == V51, V50 == V61, V51 == V62, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V44, V44 == V52, V52 == V63, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V45, V45 == V53, V53 == V64, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V46, V46 == V54, V54 == V65, V20 == V27, V27 == V34, V34 == V41, V41 == V48, V48 == V56, V56 == V67, V19 == V26, V26 == V33, V33 == V40, V40 == V47, V47 == V55, V55 == V66; #8758 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_pair-{F}(V4,V6,V8), P_t-{F}(V9), P_key-{F}(V9,V0,V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V12,V3,V10), P_key-{F}(V11,V5,V13), P_key-{F}(V12,V4,V14), P_pair-{F}(V9,V15,V7), P_generate_b_nonce-{F}(V15,V7), P_pair-{F}(V16,V9,V7), P_generate_expiration_time-{F}(V15,V17), P_pair-{F}(V17,V18,V7), P_key-{F}(V17,V1,V19), P_key-{F}(V17,V2,V19), P_key-{F}(V20,V4,V19), P_key-{F}(V20,V5,V21), P_key-{F}(V17,V9,V21) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8903: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V54, V44 == V55, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V56, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V57, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V58, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V62, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V61; #8855 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_key-{F}(V2,V1,V3), party_of_protocol-{F}(V4), party_of_protocol-{F}(V5), P_b-{F}(V5), P_a-{F}(V6), P_an_a_nonce-{F}(V7), P_pair-{F}(V6,V7,V8), P_pair-{F}(V5,V7,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V12,V4,V13), P_key-{F}(V14,V0,V13), P_key-{F}(V11,V6,V15), P_key-{F}(V12,V5,V16), P_key-{F}(V17,V5,V3), P_key-{F}(V17,V6,V18), P_key-{F}(V2,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_pair-{F}(V2,V19,V8), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V20,V2,V8), P_pair-{F}(V2,V21,V8), P_pair-{F}(V22,V14,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #8963: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V16, V10 == V17, V16 == V23, V17 == V24, V23 == V30, V24 == V31, V30 == V37, V31 == V38, V37 == V45, V38 == V46, V45 == V52, V46 == V53, V52 == V60, V53 == V61, V60 == V66, V61 == V67, V7 == V11, V11 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V54, V54 == V62, V62 == V68, V8 == V12, V12 == V19, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V55, V55 == V63, V63 == V69, V13 == V20, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V56, V56 == V64, V64 == V70, V15 == V22, V22 == V29, V29 == V36, V36 == V43, V43 == V51, V51 == V58, V58 == V73, V14 == V21, V21 == V28, V28 == V35, V35 == V42, V42 == V50, V50 == V57, V57 == V72; #8856 ), references = 1, size of lhs = 30:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V2,V11), P_key-{F}(V9,V4,V12), P_key-{F}(V10,V3,V13), P_key-{F}(V14,V0,V11), P_pair-{F}(V15,V14,V6), P_pair-{F}(V16,V17,V6), P_sent-{F}(V8,V8,V16,V18), P_key-{F}(V16,V1,V19), P_key-{F}(V20,V3,V19), P_key-{F}(V20,V4,V21), P_key-{F}(V22,V8,V21), P_triple-{F}(V8,V22,V23,V14), P_generate_expiration_time-{F}(V24,V23), P_pair-{F}(V8,V24,V25), P_pair-{F}(V26,V5,V25), P_sent-{F}(V26,V3,V25,V18), P_generate_b_nonce-{F}(V24,V27), P_encrypt-{F}(V27,V22,V6) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9016: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V16, V10 == V17, V16 == V23, V17 == V24, V23 == V30, V24 == V31, V30 == V37, V31 == V38, V37 == V44, V38 == V45, V44 == V52, V45 == V53, V52 == V57, V53 == V58, V7 == V11, V11 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V46, V46 == V54, V54 == V59, V8 == V12, V12 == V19, V19 == V26, V26 == V33, V33 == V40, V40 == V47, V47 == V55, V55 == V60, V13 == V20, V20 == V27, V27 == V34, V34 == V41, V41 == V48, V48 == V56, V56 == V61, V15 == V22, V22 == V29, V29 == V36, V36 == V43, V43 == V50, V50 == V63, V14 == V21, V21 == V28, V28 == V35, V35 == V42, V42 == V49, V49 == V62; #8857 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_pair-{F}(V2,V3,V4), P_pair-{F}(V1,V3,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V2,V9), P_key-{F}(V8,V1,V10), P_sent-{F}(V6,V6,V11,V12), P_key-{F}(V11,V0,V13), P_key-{F}(V14,V1,V13), P_key-{F}(V14,V2,V15), P_key-{F}(V16,V6,V15), P_pair-{F}(V11,V17,V4), P_encrypt-{F}(V18,V16,V4), P_generate_b_nonce-{F}(V19,V18), P_generate_expiration_time-{F}(V19,V20), P_triple-{F}(V6,V16,V20,V21), P_encrypt-{F}(V21,V8,V22), P_pair-{F}(V23,V22,V4), P_pair-{F}(V6,V19,V24), P_pair-{F}(V25,V3,V24), P_sent-{F}(V25,V1,V24,V12) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9074: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V44, V36 == V45, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V46, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V47, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V48, V20 == V27, V27 == V34, V34 == V41, V41 == V50, V19 == V26, V26 == V33, V33 == V40, V40 == V49; #9034 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V3), P_an_a_nonce-{F}(V4), P_pair-{F}(V3,V4,V5), P_pair-{F}(V2,V4,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V8,V3,V10), P_key-{F}(V9,V2,V11), P_pair-{F}(V1,V12,V5), P_generate_expiration_time-{F}(V12,V13), P_generate_b_nonce-{F}(V12,V14), P_key-{F}(V15,V0,V16), P_key-{F}(V17,V2,V16), P_key-{F}(V17,V3,V18), P_key-{F}(V19,V1,V18), P_triple-{F}(V1,V19,V13,V20), P_encrypt-{F}(V20,V9,V21), P_encrypt-{F}(V14,V19,V22), P_pair-{F}(V21,V22,V23), P_pair-{F}(V15,V24,V5), P_pair-{F}(V25,V23,V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9129: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V16, V10 == V17, V16 == V23, V17 == V24, V23 == V30, V24 == V31, V30 == V37, V31 == V38, V37 == V45, V38 == V46, V45 == V50, V46 == V51, V7 == V11, V11 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V52, V8 == V12, V12 == V19, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V53, V13 == V20, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V54, V15 == V22, V22 == V29, V29 == V36, V36 == V43, V43 == V56, V14 == V21, V21 == V28, V28 == V35, V35 == V42, V42 == V55; #9083 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_pair-{F}(V2,V3,V4), P_pair-{F}(V1,V3,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V2,V9), P_key-{F}(V8,V1,V10), P_key-{F}(V11,V1,V12), P_key-{F}(V11,V2,V13), P_key-{F}(V14,V6,V13), P_key-{F}(V15,V0,V12), P_sent-{F}(V6,V6,V15,V16), P_pair-{F}(V15,V17,V4), P_pair-{F}(V18,V3,V19), P_sent-{F}(V18,V1,V19,V16), P_pair-{F}(V6,V20,V19), P_generate_expiration_time-{F}(V20,V21), P_triple-{F}(V6,V14,V21,V22), P_encrypt-{F}(V22,V8,V23), P_generate_b_nonce-{F}(V20,V24), P_encrypt-{F}(V24,V14,V25), P_pair-{F}(V23,V25,V15) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9212: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V51, V44 == V52, V51 == V64, V52 == V65, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V53, V53 == V66, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V54, V54 == V67, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V55, V55 == V68, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V57, V57 == V73, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V56, V56 == V72; #9157 ), references = 1, size of lhs = 31:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V4,V3,V5), P_key-{F}(V6,V2,V5), party_of_protocol-{F}(V7), party_of_protocol-{F}(V8), P_b-{F}(V8), P_a-{F}(V9), P_an_a_nonce-{F}(V10), P_pair-{F}(V9,V10,V11), P_pair-{F}(V8,V10,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V15,V7,V16), P_key-{F}(V17,V0,V16), P_encrypt-{F}(V17,V6,V18), P_key-{F}(V14,V9,V19), P_key-{F}(V15,V8,V20), P_key-{F}(V21,V8,V5), P_key-{F}(V21,V9,V22), P_key-{F}(V4,V4,V22), P_generate_expiration_time-{F}(V23,V4), P_generate_b_nonce-{F}(V23,V18), P_pair-{F}(V4,V23,V11), P_pair-{F}(V4,V24,V11), P_pair-{F}(V25,V17,V11) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9265: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V51, V44 == V52, V51 == V64, V52 == V65, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V53, V53 == V66, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V54, V54 == V67, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V55, V55 == V68, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V56, V56 == V69, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V57, V57 == V70; #9158 ), references = 1, size of lhs = 31:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_a-{F}(V4), party_of_protocol-{F}(V5), P_b-{F}(V5), P_an_a_nonce-{F}(V6), P_key-{F}(V6,V3,V7), P_key-{F}(V8,V0,V7), P_generate_b_nonce-{F}(V6,V9), P_generate_expiration_time-{F}(V6,V10), P_pair-{F}(V4,V6,V11), P_pair-{F}(V5,V6,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V4,V16), P_key-{F}(V15,V5,V17), P_key-{F}(V18,V5,V7), P_key-{F}(V18,V4,V19), P_key-{F}(V6,V4,V19), P_generate_expiration_time-{F}(V20,V10), P_pair-{F}(V4,V20,V11), P_generate_b_nonce-{F}(V20,V21), P_encrypt-{F}(V8,V22,V21), P_key-{F}(V22,V2,V23), P_key-{F}(V24,V1,V23), P_pair-{F}(V25,V8,V11), P_pair-{F}(V24,V26,V11) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9318: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V51, V44 == V52, V51 == V64, V52 == V65, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V53, V53 == V66, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V54, V54 == V67, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V55, V55 == V68, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V56, V56 == V69, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V57, V57 == V70; #9159 ), references = 1, size of lhs = 31:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_a-{F}(V4), party_of_protocol-{F}(V5), P_b-{F}(V5), P_an_a_nonce-{F}(V6), P_key-{F}(V6,V3,V7), P_key-{F}(V8,V0,V7), P_generate_b_nonce-{F}(V6,V9), P_generate_expiration_time-{F}(V6,V10), P_pair-{F}(V4,V6,V11), P_pair-{F}(V5,V6,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V4,V16), P_key-{F}(V15,V5,V17), P_key-{F}(V18,V5,V7), P_key-{F}(V18,V4,V19), P_key-{F}(V6,V4,V19), P_generate_expiration_time-{F}(V20,V10), P_pair-{F}(V4,V20,V11), P_generate_b_nonce-{F}(V20,V21), P_encrypt-{F}(V8,V22,V21), P_key-{F}(V22,V2,V23), P_key-{F}(V24,V1,V23), P_pair-{F}(V25,V8,V11), P_pair-{F}(V24,V26,V11) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9375: mergings( V36 == V50, V37 == V50, V38 == V50, V40 == V50, V42 == V50, V44 == V50, V46 == V50, V48 == V50, V50 == V58, V2 == V3, V3 == V6, V6 == V10, V10 == V14, V14 == V18, V18 == V22, V22 == V27, V27 == V31, V31 == V57, V4 == V7, V7 == V11, V11 == V15, V15 == V19, V19 == V23, V23 == V28, V28 == V32, V32 == V59, V5 == V8, V8 == V12, V12 == V16, V16 == V20, V20 == V24, V24 == V29, V29 == V33, V33 == V60, V9 == V13, V13 == V17, V17 == V21, V21 == V25, V25 == V30, V30 == V34, V34 == V61, V39 == V41, V41 == V43, V43 == V45, V45 == V47, V47 == V49, V49 == V66, V51 == V52, V52 == V53, V53 == V54, V54 == V55, V55 == V56, V56 == V65; #9319 ), references = 1, size of lhs = 20:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_pair-{F}(V2,V3,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V7,V1,V8), P_key-{F}(V9,V0,V8), P_encrypt-{F}(V9,V2,V10), P_key-{F}(V6,V2,V11), P_key-{F}(V7,V2,V12), P_generate_expiration_time-{F}(V13,V2), P_generate_b_nonce-{F}(V13,V10), P_pair-{F}(V2,V13,V4), P_pair-{F}(V2,V14,V4), P_pair-{F}(V15,V9,V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9428: mergings( V3 == V4, V4 == V7, V50 == V51, V7 == V11, V51 == V52, V11 == V15, V52 == V54, V15 == V19, V54 == V56, V19 == V23, V56 == V58, V23 == V28, V58 == V60, V28 == V32, V60 == V62, V32 == V64, V62 == V65, V5 == V8, V8 == V12, V12 == V16, V16 == V20, V20 == V24, V24 == V29, V29 == V33, V33 == V66, V6 == V9, V9 == V13, V13 == V17, V17 == V21, V21 == V25, V25 == V30, V30 == V34, V34 == V67, V10 == V14, V14 == V18, V18 == V22, V22 == V26, V26 == V31, V31 == V35, V35 == V68, V43 == V44, V44 == V45, V45 == V46, V46 == V47, V47 == V48, V48 == V69, V53 == V55, V55 == V57, V57 == V59, V59 == V61, V61 == V63, V63 == V70; #9320 ), references = 1, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V0,V6), P_generate_b_nonce-{F}(V5,V8), P_generate_expiration_time-{F}(V5,V9), P_pair-{F}(V3,V5,V10), P_pair-{F}(V4,V5,V11), P_t-{F}(V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V13,V3,V15), P_key-{F}(V14,V4,V16), P_key-{F}(V17,V4,V6), P_key-{F}(V17,V3,V18), P_key-{F}(V5,V3,V18), P_generate_expiration_time-{F}(V19,V9), P_pair-{F}(V3,V19,V10), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V7,V21,V20), P_pair-{F}(V22,V7,V10), P_pair-{F}(V21,V23,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9481: mergings( V3 == V4, V4 == V7, V50 == V51, V7 == V11, V51 == V52, V11 == V15, V52 == V54, V15 == V19, V54 == V56, V19 == V23, V56 == V58, V23 == V28, V58 == V60, V28 == V32, V60 == V62, V32 == V64, V62 == V65, V5 == V8, V8 == V12, V12 == V16, V16 == V20, V20 == V24, V24 == V29, V29 == V33, V33 == V66, V6 == V9, V9 == V13, V13 == V17, V17 == V21, V21 == V25, V25 == V30, V30 == V34, V34 == V67, V10 == V14, V14 == V18, V18 == V22, V22 == V26, V26 == V31, V31 == V35, V35 == V68, V43 == V44, V44 == V45, V45 == V46, V46 == V47, V47 == V48, V48 == V69, V53 == V55, V55 == V57, V57 == V59, V59 == V61, V61 == V63, V63 == V70; #9321 ), references = 1, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V0,V6), P_generate_b_nonce-{F}(V5,V8), P_generate_expiration_time-{F}(V5,V9), P_pair-{F}(V3,V5,V10), P_pair-{F}(V4,V5,V11), P_t-{F}(V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V13,V3,V15), P_key-{F}(V14,V4,V16), P_key-{F}(V17,V4,V6), P_key-{F}(V17,V3,V18), P_key-{F}(V5,V3,V18), P_generate_expiration_time-{F}(V19,V9), P_pair-{F}(V3,V19,V10), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V7,V21,V20), P_pair-{F}(V22,V7,V10), P_pair-{F}(V21,V23,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9520: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V17, V17 == V21, V21 == V24, V24 == V40, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V18, V18 == V22, V22 == V25, V25 == V41, V7 == V10, V10 == V13, V13 == V16, V16 == V19, V19 == V23, V23 == V26, V26 == V42, V28 == V29, V29 == V30, V30 == V31, V31 == V32, V32 == V33, V33 == V46, V34 == V35, V35 == V36, V36 == V37, V37 == V38, V38 == V39, V39 == V45; #9482 ), references = 1, size of lhs = 16:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_b-{F}(V2), P_a-{F}(V2), P_an_a_nonce-{F}(V3), P_generate_expiration_time-{F}(V3,V2), P_t-{F}(V4), P_at-{F}(V5), P_bt-{F}(V6), P_key-{F}(V6,V1,V7), P_key-{F}(V3,V0,V7), P_encrypt-{F}(V3,V2,V8), P_generate_b_nonce-{F}(V3,V8), P_key-{F}(V5,V2,V9), P_key-{F}(V6,V2,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9558: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V17, V17 == V21, V21 == V24, V24 == V44, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V18, V18 == V22, V22 == V25, V25 == V45, V30 == V51, V7 == V10, V10 == V13, V13 == V16, V16 == V19, V19 == V23, V23 == V26, V26 == V46, V32 == V33, V33 == V34, V34 == V35, V35 == V36, V36 == V37, V37 == V47, V38 == V39, V39 == V40, V40 == V41, V41 == V42, V42 == V43, V43 == V48, V29 == V50; #9483 ), references = 1, size of lhs = 19:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V3), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V2,V5), P_key-{F}(V4,V0,V5), P_key-{F}(V4,V3,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V3,V9), P_key-{F}(V8,V3,V10), P_key-{F}(V11,V3,V5), P_generate_expiration_time-{F}(V4,V12), P_generate_b_nonce-{F}(V4,V13), P_encrypt-{F}(V4,V3,V13) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9596: mergings( V3 == V5, V5 == V8, V8 == V11, V11 == V14, V14 == V17, V17 == V21, V21 == V24, V24 == V44, V4 == V6, V6 == V9, V9 == V12, V12 == V15, V15 == V18, V18 == V22, V22 == V25, V25 == V45, V30 == V51, V7 == V10, V10 == V13, V13 == V16, V16 == V19, V19 == V23, V23 == V26, V26 == V46, V32 == V33, V33 == V34, V34 == V35, V35 == V36, V36 == V37, V37 == V47, V38 == V39, V39 == V40, V40 == V41, V41 == V42, V42 == V43, V43 == V48, V29 == V50; #9484 ), references = 1, size of lhs = 19:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V3), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V2,V5), P_key-{F}(V4,V0,V5), P_key-{F}(V4,V3,V5), P_t-{F}(V6), P_at-{F}(V7), P_bt-{F}(V8), P_key-{F}(V7,V3,V9), P_key-{F}(V8,V3,V10), P_key-{F}(V11,V3,V5), P_generate_expiration_time-{F}(V4,V12), P_generate_b_nonce-{F}(V4,V13), P_encrypt-{F}(V4,V3,V13) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9611: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V12, V12 == V13, V13 == V14, V4 == V6, V6 == V0, V7 == V0; #9597 ), references = 1, size of lhs = 10:
% 242.91/243.11     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V0), P_an_a_nonce-{F}(V1), P_generate_expiration_time-{F}(V1,V0), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_encrypt-{F}(V1,V0,V3), P_generate_b_nonce-{F}(V1,V3) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9624: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V12, V12 == V13, V13 == V16, V4 == V6, V6 == V0, V15 == V18, V7 == V0; #9598 ), references = 1, size of lhs = 11:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V1), party_of_protocol-{F}(V1), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_bt-{F}(V2), P_t-{F}(V3), P_generate_expiration_time-{F}(V2,V4), P_generate_b_nonce-{F}(V2,V5), P_encrypt-{F}(V2,V1,V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9637: mergings( V3 == V5, V5 == V8, V8 == V9, V9 == V10, V10 == V11, V11 == V12, V12 == V13, V13 == V16, V4 == V6, V6 == V0, V15 == V18, V7 == V0; #9599 ), references = 1, size of lhs = 11:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V1), party_of_protocol-{F}(V1), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_bt-{F}(V2), P_t-{F}(V3), P_generate_expiration_time-{F}(V2,V4), P_generate_b_nonce-{F}(V2,V5), P_encrypt-{F}(V2,V1,V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9700: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V46, V37 == V47, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V48, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V49, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V50, V20 == V27, V27 == V34, V34 == V42, V42 == V57, V19 == V26, V26 == V33, V33 == V41, V41 == V56; #9659 ), references = 1, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), party_of_protocol-{F}(V5), P_b-{F}(V5), P_a-{F}(V6), P_an_a_nonce-{F}(V7), P_pair-{F}(V6,V7,V3), P_pair-{F}(V5,V7,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V11,V4,V12), P_key-{F}(V13,V0,V12), P_key-{F}(V13,V2,V12), P_pair-{F}(V14,V13,V3), P_key-{F}(V15,V1,V12), P_encrypt-{F}(V3,V15,V16), P_key-{F}(V10,V6,V17), P_key-{F}(V11,V5,V18), P_key-{F}(V19,V5,V12), P_key-{F}(V19,V6,V20), P_key-{F}(V13,V3,V20), P_generate_expiration_time-{F}(V21,V3), P_generate_b_nonce-{F}(V21,V16), P_pair-{F}(V3,V21,V3) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9739: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V50, V37 == V51, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V52, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V53, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V54, V19 == V26, V26 == V33, V33 == V41, V41 == V55, V20 == V27, V27 == V34, V34 == V42, V42 == V56; #9660 ), references = 1, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V0,V6), P_key-{F}(V8,V1,V6), P_generate_b_nonce-{F}(V5,V9), P_generate_expiration_time-{F}(V5,V10), P_pair-{F}(V3,V5,V11), P_pair-{F}(V4,V5,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V3,V16), P_key-{F}(V15,V4,V17), P_key-{F}(V18,V4,V6), P_key-{F}(V18,V3,V19), P_key-{F}(V5,V3,V19), P_generate_expiration_time-{F}(V20,V10), P_pair-{F}(V3,V20,V11), P_generate_b_nonce-{F}(V20,V21), P_encrypt-{F}(V11,V8,V21), P_pair-{F}(V22,V7,V11) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9778: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V50, V37 == V51, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V52, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V53, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V54, V19 == V26, V26 == V33, V33 == V41, V41 == V55, V20 == V27, V27 == V34, V34 == V42, V42 == V56; #9661 ), references = 1, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V0,V6), P_key-{F}(V8,V1,V6), P_generate_b_nonce-{F}(V5,V9), P_generate_expiration_time-{F}(V5,V10), P_pair-{F}(V3,V5,V11), P_pair-{F}(V4,V5,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V3,V16), P_key-{F}(V15,V4,V17), P_key-{F}(V18,V4,V6), P_key-{F}(V18,V3,V19), P_key-{F}(V5,V3,V19), P_generate_expiration_time-{F}(V20,V10), P_pair-{F}(V3,V20,V11), P_generate_b_nonce-{F}(V20,V21), P_encrypt-{F}(V11,V8,V21), P_pair-{F}(V22,V7,V11) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9841: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V45, V37 == V46, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V47, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V48, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V49, V20 == V27, V27 == V34, V34 == V42, V42 == V55, V19 == V26, V26 == V33, V33 == V41, V41 == V54; #9800 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V2), P_pair-{F}(V4,V6,V7), P_t-{F}(V8), P_at-{F}(V9), P_bt-{F}(V10), P_key-{F}(V10,V3,V11), P_key-{F}(V12,V0,V11), P_key-{F}(V12,V1,V11), P_pair-{F}(V13,V12,V2), P_triple-{F}(V2,V12,V2,V14), P_key-{F}(V9,V5,V15), P_key-{F}(V10,V4,V16), P_key-{F}(V17,V4,V11), P_key-{F}(V17,V5,V18), P_key-{F}(V12,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V14), P_pair-{F}(V2,V19,V2) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9880: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V48, V37 == V49, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V50, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V51, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V52, V19 == V26, V26 == V33, V33 == V41, V41 == V53, V20 == V27, V27 == V34, V34 == V42, V42 == V54; #9801 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_triple-{F}(V9,V6,V9,V19), P_pair-{F}(V20,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #9919: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V48, V37 == V49, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V50, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V51, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V52, V19 == V26, V26 == V33, V33 == V41, V41 == V53, V20 == V27, V27 == V34, V34 == V42, V42 == V54; #9802 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_pair-{F}(V2,V18,V9), P_generate_b_nonce-{F}(V18,V19), P_triple-{F}(V9,V6,V9,V19), P_pair-{F}(V20,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #10189: mergings( V4 == V15, V15 == V33, V0 == V16, V16 == V31, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V34, V18 == V35, V19 == V36, V20 == V37, V1 == V21, V21 == V38, V9 == V22, V22 == V39, V10 == V23, V23 == V40, V24 == V41, V25 == V42; #10166 ), references = 1, size of lhs = 37:
% 242.91/243.11     fresh_to_b-{F}(V0), P_generate_b_nonce-{F}(V0,V1), P_generate_expiration_time-{F}(V0,V2), message-{F}(V3), intruder_message-{F}(V4), intruder_message-{F}(V5), intruder_message-{F}(V6), party_of_protocol-{F}(V6), intruder_holds-{F}(V7), party_of_protocol-{F}(V8), party_of_protocol-{F}(V9), P_b-{F}(V9), b_stored-{F}(V10), P_a-{F}(V11), P_an_a_nonce-{F}(V12), P_pair-{F}(V11,V12,V13), P_sent-{F}(V11,V9,V13,V14), P_pair-{F}(V9,V12,V15), P_t-{F}(V16), P_at-{F}(V17), P_bt-{F}(V18), P_key-{F}(V18,V8,V7), P_key-{F}(V17,V11,V19), P_key-{F}(V18,V9,V20), intruder_holds-{F}(V21), P_key-{F}(V22,V9,V21), P_key-{F}(V22,V11,V23), P_key-{F}(V4,V6,V23), P_pair-{F}(V6,V24,V10), P_generate_expiration_time-{F}(V24,V5), P_generate_b_nonce-{F}(V24,V25), P_encrypt-{F}(V25,V4,V26), P_triple-{F}(V9,V1,V27,V26), P_encrypt-{F}(V28,V18,V27), P_triple-{F}(V29,V0,V2,V28), P_pair-{F}(V29,V0,V30), P_sent-{F}(V29,V9,V30,V3) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #10213: mergings( V11 == V26, V4 == V15, V15 == V33, V0 == V16, V16 == V31, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V34, V18 == V35, V19 == V36, V20 == V37, V1 == V21, V21 == V38, V9 == V22, V22 == V39, V12 == V27, V13 == V28, V10 == V23, V23 == V40, V24 == V41, V25 == V42; #10167 ), references = 1, size of lhs = 34:
% 242.91/243.11     message-{F}(V0), fresh_to_b-{F}(V1), P_generate_b_nonce-{F}(V1,V2), P_generate_expiration_time-{F}(V1,V3), message-{F}(V4), party_of_protocol-{F}(V5), party_of_protocol-{F}(V6), P_b-{F}(V6), b_stored-{F}(V7), P_a-{F}(V8), P_an_a_nonce-{F}(V9), P_pair-{F}(V8,V9,V10), P_sent-{F}(V8,V6,V10,V11), P_pair-{F}(V6,V9,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V8,V16), P_key-{F}(V15,V6,V17), intruder_holds-{F}(V18), P_key-{F}(V19,V6,V18), P_key-{F}(V19,V8,V20), P_key-{F}(V1,V5,V20), P_pair-{F}(V5,V21,V7), P_generate_expiration_time-{F}(V21,V3), P_generate_b_nonce-{F}(V21,V22), P_encrypt-{F}(V22,V1,V23), P_pair-{F}(V5,V1,V24), P_sent-{F}(V5,V6,V24,V4), P_triple-{F}(V6,V2,V25,V23), P_encrypt-{F}(V26,V15,V25), P_triple-{F}(V27,V1,V3,V26), P_pair-{F}(V27,V1,V28), P_sent-{F}(V27,V6,V28,V0) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #10237: mergings( V11 == V26, V4 == V15, V15 == V33, V0 == V16, V16 == V31, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V34, V18 == V35, V19 == V36, V20 == V37, V1 == V21, V21 == V38, V9 == V22, V22 == V39, V12 == V27, V13 == V28, V10 == V23, V23 == V40, V24 == V41, V25 == V42; #10168 ), references = 1, size of lhs = 34:
% 242.91/243.11     message-{F}(V0), fresh_to_b-{F}(V1), P_generate_b_nonce-{F}(V1,V2), P_generate_expiration_time-{F}(V1,V3), message-{F}(V4), party_of_protocol-{F}(V5), party_of_protocol-{F}(V6), P_b-{F}(V6), b_stored-{F}(V7), P_a-{F}(V8), P_an_a_nonce-{F}(V9), P_pair-{F}(V8,V9,V10), P_sent-{F}(V8,V6,V10,V11), P_pair-{F}(V6,V9,V12), P_t-{F}(V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V8,V16), P_key-{F}(V15,V6,V17), intruder_holds-{F}(V18), P_key-{F}(V19,V6,V18), P_key-{F}(V19,V8,V20), P_key-{F}(V1,V5,V20), P_pair-{F}(V5,V21,V7), P_generate_expiration_time-{F}(V21,V3), P_generate_b_nonce-{F}(V21,V22), P_encrypt-{F}(V22,V1,V23), P_pair-{F}(V5,V1,V24), P_sent-{F}(V5,V6,V24,V4), P_triple-{F}(V6,V2,V25,V23), P_encrypt-{F}(V26,V15,V25), P_triple-{F}(V27,V1,V3,V26), P_pair-{F}(V27,V1,V28), P_sent-{F}(V27,V6,V28,V0) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #10732: mergings( V4 == V15, V15 == V29, V0 == V16, V16 == V27, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V30, V18 == V31, V19 == V32, V20 == V33, V1 == V21, V21 == V34, V9 == V22, V22 == V35, V10 == V23, V23 == V36, V24 == V37, V25 == V38; #10711 ), references = 1, size of lhs = 34:
% 242.91/243.11     fresh_to_b-{F}(V0), P_generate_b_nonce-{F}(V0,V1), P_generate_expiration_time-{F}(V0,V2), message-{F}(V3), party_of_protocol-{F}(V4), party_of_protocol-{F}(V5), P_b-{F}(V5), b_stored-{F}(V6), P_a-{F}(V7), P_an_a_nonce-{F}(V8), P_pair-{F}(V7,V8,V9), P_sent-{F}(V7,V5,V9,V10), P_pair-{F}(V5,V8,V11), P_t-{F}(V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V13,V7,V15), P_key-{F}(V14,V5,V16), intruder_holds-{F}(V17), P_key-{F}(V18,V5,V17), P_key-{F}(V18,V7,V19), P_key-{F}(V20,V4,V19), P_pair-{F}(V4,V21,V6), P_generate_expiration_time-{F}(V21,V22), P_triple-{F}(V4,V20,V22,V23), P_encrypt-{F}(V23,V14,V24), P_generate_b_nonce-{F}(V21,V25), P_encrypt-{F}(V25,V20,V26), P_pair-{F}(V24,V26,V27), P_triple-{F}(V5,V1,V28,V27), P_encrypt-{F}(V29,V14,V28), P_triple-{F}(V30,V0,V2,V29), P_pair-{F}(V30,V0,V31), P_sent-{F}(V30,V5,V31,V3) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #11163: mergings( V4 == V15, V15 == V26, V26 == V46, V0 == V16, V16 == V27, V27 == V44, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V28, V18 == V29, V19 == V30, V20 == V31, V28 == V47, V29 == V48, V30 == V49, V31 == V50, V1 == V21, V21 == V32, V32 == V51, V9 == V22, V22 == V33, V33 == V52, V10 == V23, V23 == V34, V34 == V53, V24 == V35, V25 == V36, V35 == V54, V36 == V55; #11129 ), references = 1, size of lhs = 40:
% 242.91/243.11     fresh_to_b-{F}(V0), P_generate_b_nonce-{F}(V0,V1), P_generate_expiration_time-{F}(V0,V2), message-{F}(V3), intruder_holds-{F}(V4), party_of_protocol-{F}(V5), intruder_message-{F}(V6), P_key-{F}(V6,V5,V4), intruder_message-{F}(V7), intruder_message-{F}(V8), party_of_protocol-{F}(V8), intruder_holds-{F}(V9), party_of_protocol-{F}(V10), party_of_protocol-{F}(V11), P_b-{F}(V11), b_stored-{F}(V12), P_a-{F}(V13), P_an_a_nonce-{F}(V14), P_pair-{F}(V13,V14,V15), P_sent-{F}(V13,V11,V15,V16), P_pair-{F}(V11,V14,V17), P_t-{F}(V18), P_at-{F}(V19), P_bt-{F}(V20), P_key-{F}(V20,V10,V9), P_key-{F}(V19,V13,V21), P_key-{F}(V20,V11,V22), intruder_holds-{F}(V23), P_key-{F}(V24,V11,V23), P_key-{F}(V24,V13,V25), P_key-{F}(V6,V8,V25), P_pair-{F}(V8,V26,V12), P_generate_expiration_time-{F}(V26,V7), P_generate_b_nonce-{F}(V26,V27), P_triple-{F}(V28,V0,V2,V29), P_encrypt-{F}(V29,V20,V30), P_triple-{F}(V11,V1,V30,V31), P_pair-{F}(V28,V0,V32), P_sent-{F}(V28,V11,V32,V3), P_triple-{F}(V33,V27,V34,V31) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #11198: mergings( V11 == V39, V4 == V15, V15 == V26, V26 == V46, V0 == V16, V16 == V27, V27 == V44, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V28, V18 == V29, V19 == V30, V20 == V31, V28 == V47, V29 == V48, V30 == V49, V31 == V50, V1 == V21, V21 == V32, V32 == V51, V9 == V22, V22 == V33, V33 == V52, V12 == V40, V13 == V41, V10 == V23, V23 == V34, V34 == V53, V24 == V35, V25 == V36, V35 == V54, V36 == V55; #11130 ), references = 1, size of lhs = 37:
% 242.91/243.11     message-{F}(V0), intruder_holds-{F}(V1), party_of_protocol-{F}(V2), fresh_to_b-{F}(V3), P_key-{F}(V3,V2,V1), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), message-{F}(V6), party_of_protocol-{F}(V7), party_of_protocol-{F}(V8), P_b-{F}(V8), b_stored-{F}(V9), P_a-{F}(V10), P_an_a_nonce-{F}(V11), P_pair-{F}(V10,V11,V12), P_sent-{F}(V10,V8,V12,V13), P_pair-{F}(V8,V11,V14), P_t-{F}(V15), P_at-{F}(V16), P_bt-{F}(V17), P_key-{F}(V16,V10,V18), P_key-{F}(V17,V8,V19), intruder_holds-{F}(V20), P_key-{F}(V21,V8,V20), P_key-{F}(V21,V10,V22), P_key-{F}(V3,V7,V22), P_pair-{F}(V7,V23,V9), P_generate_expiration_time-{F}(V23,V5), P_generate_b_nonce-{F}(V23,V24), P_pair-{F}(V7,V3,V25), P_sent-{F}(V7,V8,V25,V6), P_triple-{F}(V26,V3,V5,V27), P_encrypt-{F}(V27,V17,V28), P_triple-{F}(V8,V4,V28,V29), P_pair-{F}(V26,V3,V30), P_sent-{F}(V26,V8,V30,V0), P_triple-{F}(V31,V24,V32,V29) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #11233: mergings( V11 == V39, V4 == V15, V15 == V26, V26 == V46, V0 == V16, V16 == V27, V27 == V44, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V28, V18 == V29, V19 == V30, V20 == V31, V28 == V47, V29 == V48, V30 == V49, V31 == V50, V1 == V21, V21 == V32, V32 == V51, V9 == V22, V22 == V33, V33 == V52, V12 == V40, V13 == V41, V10 == V23, V23 == V34, V34 == V53, V24 == V35, V25 == V36, V35 == V54, V36 == V55; #11131 ), references = 1, size of lhs = 37:
% 242.91/243.11     message-{F}(V0), intruder_holds-{F}(V1), party_of_protocol-{F}(V2), fresh_to_b-{F}(V3), P_key-{F}(V3,V2,V1), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), message-{F}(V6), party_of_protocol-{F}(V7), party_of_protocol-{F}(V8), P_b-{F}(V8), b_stored-{F}(V9), P_a-{F}(V10), P_an_a_nonce-{F}(V11), P_pair-{F}(V10,V11,V12), P_sent-{F}(V10,V8,V12,V13), P_pair-{F}(V8,V11,V14), P_t-{F}(V15), P_at-{F}(V16), P_bt-{F}(V17), P_key-{F}(V16,V10,V18), P_key-{F}(V17,V8,V19), intruder_holds-{F}(V20), P_key-{F}(V21,V8,V20), P_key-{F}(V21,V10,V22), P_key-{F}(V3,V7,V22), P_pair-{F}(V7,V23,V9), P_generate_expiration_time-{F}(V23,V5), P_generate_b_nonce-{F}(V23,V24), P_pair-{F}(V7,V3,V25), P_sent-{F}(V7,V8,V25,V6), P_triple-{F}(V26,V3,V5,V27), P_encrypt-{F}(V27,V17,V28), P_triple-{F}(V8,V4,V28,V29), P_pair-{F}(V26,V3,V30), P_sent-{F}(V26,V8,V30,V0), P_triple-{F}(V31,V24,V32,V29) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #11268: mergings( V4 == V15, V15 == V26, V26 == V46, V0 == V16, V16 == V27, V27 == V44, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V28, V18 == V29, V19 == V30, V20 == V31, V28 == V47, V29 == V48, V30 == V49, V31 == V50, V9 == V21, V21 == V32, V32 == V51, V10 == V22, V22 == V33, V33 == V52, V11 == V23, V23 == V34, V34 == V53, V24 == V35, V25 == V36, V35 == V54, V36 == V55; #11234 ), references = 4, size of lhs = 38:
% 242.91/243.11     fresh_to_b-{F}(V0), P_generate_b_nonce-{F}(V0,V1), P_generate_expiration_time-{F}(V0,V2), message-{F}(V3), intruder_holds-{F}(V4), party_of_protocol-{F}(V5), intruder_message-{F}(V6), P_key-{F}(V6,V5,V4), intruder_message-{F}(V7), intruder_message-{F}(V8), party_of_protocol-{F}(V8), intruder_holds-{F}(V9), party_of_protocol-{F}(V10), party_of_protocol-{F}(V11), P_b-{F}(V11), b_stored-{F}(V12), P_a-{F}(V13), P_an_a_nonce-{F}(V14), P_pair-{F}(V13,V14,V15), P_sent-{F}(V13,V11,V15,V16), P_pair-{F}(V11,V14,V17), P_t-{F}(V18), P_at-{F}(V19), P_bt-{F}(V20), P_key-{F}(V20,V10,V9), P_key-{F}(V19,V13,V21), P_key-{F}(V20,V11,V22), intruder_holds-{F}(V23), P_key-{F}(V24,V11,V23), P_key-{F}(V24,V13,V25), P_key-{F}(V6,V8,V25), P_pair-{F}(V8,V26,V12), P_generate_expiration_time-{F}(V26,V7), P_generate_b_nonce-{F}(V26,V1), P_triple-{F}(V27,V0,V2,V28), P_encrypt-{F}(V28,V20,V29), P_pair-{F}(V27,V0,V30), P_sent-{F}(V27,V11,V30,V3) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #11303: mergings( V12 == V39, V4 == V15, V15 == V26, V26 == V46, V0 == V16, V16 == V27, V27 == V44, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V28, V18 == V29, V19 == V30, V20 == V31, V28 == V47, V29 == V48, V30 == V49, V31 == V50, V9 == V21, V21 == V32, V32 == V51, V10 == V22, V22 == V33, V33 == V52, V1 == V40, V13 == V41, V11 == V23, V23 == V34, V34 == V53, V24 == V35, V25 == V36, V35 == V54, V36 == V55; #11235 ), references = 4, size of lhs = 35:
% 242.91/243.11     message-{F}(V0), intruder_holds-{F}(V1), party_of_protocol-{F}(V2), fresh_to_b-{F}(V3), P_key-{F}(V3,V2,V1), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), message-{F}(V6), party_of_protocol-{F}(V7), party_of_protocol-{F}(V8), P_b-{F}(V8), b_stored-{F}(V9), P_a-{F}(V10), P_an_a_nonce-{F}(V11), P_pair-{F}(V10,V11,V12), P_sent-{F}(V10,V8,V12,V13), P_pair-{F}(V8,V11,V14), P_t-{F}(V15), P_at-{F}(V16), P_bt-{F}(V17), P_key-{F}(V16,V10,V18), P_key-{F}(V17,V8,V19), intruder_holds-{F}(V20), P_key-{F}(V21,V8,V20), P_key-{F}(V21,V10,V22), P_key-{F}(V3,V7,V22), P_pair-{F}(V7,V23,V9), P_generate_expiration_time-{F}(V23,V5), P_generate_b_nonce-{F}(V23,V4), P_pair-{F}(V7,V3,V24), P_sent-{F}(V7,V8,V24,V6), P_triple-{F}(V25,V3,V5,V26), P_encrypt-{F}(V26,V17,V27), P_pair-{F}(V25,V3,V28), P_sent-{F}(V25,V8,V28,V0) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #11338: mergings( V12 == V39, V4 == V15, V15 == V26, V26 == V46, V0 == V16, V16 == V27, V27 == V44, V5 == V17, V6 == V18, V7 == V19, V8 == V20, V17 == V28, V18 == V29, V19 == V30, V20 == V31, V28 == V47, V29 == V48, V30 == V49, V31 == V50, V9 == V21, V21 == V32, V32 == V51, V10 == V22, V22 == V33, V33 == V52, V1 == V40, V13 == V41, V11 == V23, V23 == V34, V34 == V53, V24 == V35, V25 == V36, V35 == V54, V36 == V55; #11236 ), references = 4, size of lhs = 35:
% 242.91/243.11     message-{F}(V0), intruder_holds-{F}(V1), party_of_protocol-{F}(V2), fresh_to_b-{F}(V3), P_key-{F}(V3,V2,V1), P_generate_b_nonce-{F}(V3,V4), P_generate_expiration_time-{F}(V3,V5), message-{F}(V6), party_of_protocol-{F}(V7), party_of_protocol-{F}(V8), P_b-{F}(V8), b_stored-{F}(V9), P_a-{F}(V10), P_an_a_nonce-{F}(V11), P_pair-{F}(V10,V11,V12), P_sent-{F}(V10,V8,V12,V13), P_pair-{F}(V8,V11,V14), P_t-{F}(V15), P_at-{F}(V16), P_bt-{F}(V17), P_key-{F}(V16,V10,V18), P_key-{F}(V17,V8,V19), intruder_holds-{F}(V20), P_key-{F}(V21,V8,V20), P_key-{F}(V21,V10,V22), P_key-{F}(V3,V7,V22), P_pair-{F}(V7,V23,V9), P_generate_expiration_time-{F}(V23,V5), P_generate_b_nonce-{F}(V23,V4), P_pair-{F}(V7,V3,V24), P_sent-{F}(V7,V8,V24,V6), P_triple-{F}(V25,V3,V5,V26), P_encrypt-{F}(V26,V17,V27), P_pair-{F}(V25,V3,V28), P_sent-{F}(V25,V8,V28,V0) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #11430: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V51, V44 == V52, V51 == V58, V52 == V59, V58 == V65, V59 == V66, V65 == V75, V66 == V76, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V53, V53 == V60, V60 == V67, V67 == V77, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V54, V54 == V61, V61 == V68, V68 == V78, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V55, V55 == V62, V62 == V69, V69 == V79, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V64, V64 == V71, V71 == V84, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V63, V63 == V70, V70 == V83; #11363 ), references = 1, size of lhs = 33:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), party_of_protocol-{F}(V5), P_b-{F}(V5), P_a-{F}(V6), P_an_a_nonce-{F}(V7), P_pair-{F}(V6,V7,V3), P_generate_b_nonce-{F}(V7,V8), P_generate_expiration_time-{F}(V7,V9), P_pair-{F}(V5,V7,V10), P_t-{F}(V11), P_sent-{F}(V11,V1,V3,V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V14,V4,V15), P_key-{F}(V16,V0,V15), P_key-{F}(V16,V2,V15), P_pair-{F}(V17,V16,V3), P_key-{F}(V13,V6,V18), P_key-{F}(V14,V5,V19), P_key-{F}(V20,V5,V15), P_key-{F}(V20,V6,V21), P_key-{F}(V16,V3,V21), P_generate_expiration_time-{F}(V22,V3), P_generate_b_nonce-{F}(V22,V8), P_pair-{F}(V3,V22,V3), P_triple-{F}(V23,V7,V9,V24), P_encrypt-{F}(V24,V14,V25), P_pair-{F}(V23,V7,V26), P_sent-{F}(V23,V5,V26,V12) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #11497: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V51, V44 == V52, V51 == V58, V52 == V59, V58 == V65, V59 == V66, V65 == V77, V66 == V78, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V53, V53 == V60, V60 == V67, V67 == V79, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V54, V54 == V61, V61 == V68, V68 == V80, V56 == V75, V57 == V76, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V55, V55 == V62, V62 == V69, V69 == V81, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V63, V63 == V70, V70 == V82, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V64, V64 == V71, V71 == V83; #11364 ), references = 2, size of lhs = 31:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V0,V6), P_generate_b_nonce-{F}(V5,V8), P_generate_expiration_time-{F}(V5,V9), P_pair-{F}(V3,V5,V10), P_pair-{F}(V4,V5,V11), P_t-{F}(V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V13,V3,V15), P_key-{F}(V14,V4,V16), P_key-{F}(V17,V4,V6), P_key-{F}(V17,V3,V18), P_key-{F}(V5,V3,V18), P_generate_expiration_time-{F}(V19,V9), P_generate_b_nonce-{F}(V19,V8), P_pair-{F}(V3,V19,V10), P_pair-{F}(V20,V7,V10), P_sent-{F}(V12,V1,V10,V21), P_triple-{F}(V22,V5,V9,V23), P_encrypt-{F}(V23,V14,V24), P_pair-{F}(V22,V5,V25), P_sent-{F}(V22,V4,V25,V21) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #11564: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V51, V44 == V52, V51 == V58, V52 == V59, V58 == V65, V59 == V66, V65 == V77, V66 == V78, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V53, V53 == V60, V60 == V67, V67 == V79, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V54, V54 == V61, V61 == V68, V68 == V80, V56 == V75, V57 == V76, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V55, V55 == V62, V62 == V69, V69 == V81, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V63, V63 == V70, V70 == V82, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V64, V64 == V71, V71 == V83; #11365 ), references = 2, size of lhs = 31:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V0,V6), P_generate_b_nonce-{F}(V5,V8), P_generate_expiration_time-{F}(V5,V9), P_pair-{F}(V3,V5,V10), P_pair-{F}(V4,V5,V11), P_t-{F}(V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V13,V3,V15), P_key-{F}(V14,V4,V16), P_key-{F}(V17,V4,V6), P_key-{F}(V17,V3,V18), P_key-{F}(V5,V3,V18), P_generate_expiration_time-{F}(V19,V9), P_generate_b_nonce-{F}(V19,V8), P_pair-{F}(V3,V19,V10), P_pair-{F}(V20,V7,V10), P_sent-{F}(V12,V1,V10,V21), P_triple-{F}(V22,V5,V9,V23), P_encrypt-{F}(V23,V14,V24), P_pair-{F}(V22,V5,V25), P_sent-{F}(V22,V4,V25,V21) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #11632: mergings( V4 == V5, V5 == V8, V48 == V49, V8 == V12, V49 == V50, V12 == V15, V50 == V52, V15 == V19, V52 == V54, V19 == V23, V54 == V56, V23 == V28, V56 == V58, V28 == V32, V58 == V60, V32 == V38, V60 == V61, V38 == V42, V61 == V63, V42 == V73, V63 == V74, V6 == V9, V9 == V0, V0 == V16, V16 == V20, V20 == V24, V24 == V29, V29 == V33, V33 == V39, V39 == V43, V43 == V75, V7 == V10, V10 == V13, V13 == V17, V17 == V21, V21 == V25, V25 == V30, V30 == V34, V34 == V40, V40 == V44, V44 == V76, V11 == V14, V14 == V18, V18 == V22, V22 == V26, V26 == V31, V31 == V35, V35 == V41, V41 == V45, V45 == V77, V51 == V53, V53 == V55, V55 == V57, V57 == V59, V59 == V62, V62 == V64, V64 == V82, V66 == V67, V67 == V68, V68 == V69, V69 == V70, V70 == V71, V71 == V72, V72 == V81; #11565 ), references = 2, size of lhs = 30:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V2), P_generate_b_nonce-{F}(V6,V7), P_generate_expiration_time-{F}(V6,V8), P_pair-{F}(V4,V6,V9), P_t-{F}(V10), P_pair-{F}(V10,V6,V2), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V12,V3,V13), P_key-{F}(V14,V0,V13), P_key-{F}(V14,V1,V13), P_pair-{F}(V15,V14,V2), P_key-{F}(V11,V5,V16), P_key-{F}(V12,V4,V17), P_key-{F}(V18,V4,V13), P_key-{F}(V18,V5,V19), P_key-{F}(V14,V2,V19), P_generate_expiration_time-{F}(V20,V2), P_generate_b_nonce-{F}(V20,V7), P_pair-{F}(V2,V20,V2), P_triple-{F}(V10,V6,V8,V21), P_encrypt-{F}(V21,V12,V22) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #11699: mergings( V4 == V5, V5 == V8, V59 == V60, V8 == V12, V60 == V61, V12 == V15, V61 == V63, V15 == V19, V63 == V65, V19 == V23, V65 == V67, V23 == V28, V67 == V69, V28 == V32, V69 == V71, V32 == V38, V71 == V72, V38 == V42, V72 == V74, V42 == V76, V74 == V77, V6 == V9, V9 == V0, V0 == V16, V16 == V20, V20 == V24, V24 == V29, V29 == V33, V33 == V39, V39 == V43, V43 == V78, V7 == V10, V10 == V13, V13 == V17, V17 == V21, V21 == V25, V25 == V30, V30 == V34, V34 == V40, V40 == V44, V44 == V79, V36 == V49, V37 == V50, V11 == V14, V14 == V18, V18 == V22, V22 == V26, V26 == V31, V31 == V35, V35 == V41, V41 == V45, V45 == V80, V52 == V53, V53 == V54, V54 == V55, V55 == V56, V56 == V57, V57 == V58, V58 == V81, V62 == V64, V64 == V66, V66 == V68, V68 == V70, V70 == V73, V73 == V75, V75 == V82; #11566 ), references = 2, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_pair-{F}(V11,V4,V9), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V2,V18,V9), P_pair-{F}(V19,V6,V9), P_triple-{F}(V11,V4,V8,V20), P_encrypt-{F}(V20,V13,V21) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #11766: mergings( V4 == V5, V5 == V8, V59 == V60, V8 == V12, V60 == V61, V12 == V15, V61 == V63, V15 == V19, V63 == V65, V19 == V23, V65 == V67, V23 == V28, V67 == V69, V28 == V32, V69 == V71, V32 == V38, V71 == V72, V38 == V42, V72 == V74, V42 == V76, V74 == V77, V6 == V9, V9 == V0, V0 == V16, V16 == V20, V20 == V24, V24 == V29, V29 == V33, V33 == V39, V39 == V43, V43 == V78, V7 == V10, V10 == V13, V13 == V17, V17 == V21, V21 == V25, V25 == V30, V30 == V34, V34 == V40, V40 == V44, V44 == V79, V36 == V49, V37 == V50, V11 == V14, V14 == V18, V18 == V22, V22 == V26, V26 == V31, V31 == V35, V35 == V41, V41 == V45, V45 == V80, V52 == V53, V53 == V54, V54 == V55, V55 == V56, V56 == V57, V57 == V58, V58 == V81, V62 == V64, V64 == V66, V66 == V68, V68 == V70, V70 == V73, V73 == V75, V75 == V82; #11567 ), references = 2, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_pair-{F}(V11,V4,V9), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V2,V18,V9), P_pair-{F}(V19,V6,V9), P_triple-{F}(V11,V4,V8,V20), P_encrypt-{F}(V20,V13,V21) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #11819: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V41, V29 == V42, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V43, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V44, V13 == V18, V18 == V25, V25 == V32, V32 == V45, V19 == V26, V26 == V33, V33 == V46, V20 == V27, V27 == V34, V34 == V47; #11785 ), references = 2, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V2,V18,V9), P_pair-{F}(V19,V6,V9), P_triple-{F}(V2,V4,V8,V20), P_encrypt-{F}(V20,V13,V21) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #11851: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V41, V29 == V42, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V43, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V44, V13 == V18, V18 == V25, V25 == V32, V32 == V45, V19 == V26, V26 == V33, V33 == V46, V20 == V27, V27 == V34, V34 == V47; #11786 ), references = 2, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V2,V18,V9), P_pair-{F}(V19,V6,V9), P_triple-{F}(V2,V4,V8,V20), P_encrypt-{F}(V20,V13,V21) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #11883: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V40, V29 == V41, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V42, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V43, V13 == V18, V18 == V25, V25 == V32, V32 == V44, V20 == V27, V27 == V34, V34 == V49, V19 == V26, V26 == V33, V33 == V48; #11787 ), references = 1, size of lhs = 29:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V2), P_generate_b_nonce-{F}(V6,V7), P_generate_expiration_time-{F}(V6,V8), P_pair-{F}(V4,V6,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V12,V3,V13), P_key-{F}(V14,V0,V13), P_key-{F}(V14,V1,V13), P_pair-{F}(V15,V14,V2), P_key-{F}(V11,V5,V16), P_key-{F}(V12,V4,V17), P_key-{F}(V18,V4,V13), P_key-{F}(V18,V5,V19), P_key-{F}(V14,V2,V19), P_generate_expiration_time-{F}(V20,V2), P_generate_b_nonce-{F}(V20,V7), P_pair-{F}(V2,V20,V2), P_triple-{F}(V5,V6,V8,V21), P_encrypt-{F}(V21,V12,V22) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12014: exists( #39, #11699 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_pair-{F}(V11,V4,V9), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V2,V18,V9), P_pair-{F}(V19,V6,V9), P_triple-{F}(V11,V4,V8,V20) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12015: exists( #39, #11766 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_pair-{F}(V11,V4,V9), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V2,V18,V9), P_pair-{F}(V19,V6,V9), P_triple-{F}(V11,V4,V8,V20) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12016: exists( #39, #11632 ), references = 1, size of lhs = 29:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V2), P_generate_b_nonce-{F}(V6,V7), P_generate_expiration_time-{F}(V6,V8), P_pair-{F}(V4,V6,V9), P_t-{F}(V10), P_pair-{F}(V10,V6,V2), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V12,V3,V13), P_key-{F}(V14,V0,V13), P_key-{F}(V14,V1,V13), P_pair-{F}(V15,V14,V2), P_key-{F}(V11,V5,V16), P_key-{F}(V12,V4,V17), P_key-{F}(V18,V4,V13), P_key-{F}(V18,V5,V19), P_key-{F}(V14,V2,V19), P_generate_expiration_time-{F}(V20,V2), P_generate_b_nonce-{F}(V20,V7), P_pair-{F}(V2,V20,V2), P_triple-{F}(V10,V6,V8,V21) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12020: exists( #41, #12011 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_pair-{F}(V11,V4,V9), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V2,V18,V9), P_pair-{F}(V19,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12021: exists( #41, #12012 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_pair-{F}(V11,V4,V9), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V2,V18,V9), P_pair-{F}(V19,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12022: exists( #41, #12013 ), references = 1, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V2), P_generate_b_nonce-{F}(V6,V7), P_generate_expiration_time-{F}(V6,V8), P_pair-{F}(V4,V6,V9), P_t-{F}(V10), P_pair-{F}(V10,V6,V2), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V12,V3,V13), P_key-{F}(V14,V0,V13), P_key-{F}(V14,V1,V13), P_pair-{F}(V15,V14,V2), P_key-{F}(V11,V5,V16), P_key-{F}(V12,V4,V17), P_key-{F}(V18,V4,V13), P_key-{F}(V18,V5,V19), P_key-{F}(V14,V2,V19), P_generate_expiration_time-{F}(V20,V2), P_generate_b_nonce-{F}(V20,V7), P_pair-{F}(V2,V20,V2) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12027: mergings( V5 == V6; #12023 ), references = 1, size of lhs = 15:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_generate_b_nonce-{F}(V1,V2), P_generate_expiration_time-{F}(V1,V3), P_pair-{F}(V0,V1,V4), P_t-{F}(V5), P_pair-{F}(V5,V1,V4), P_generate_expiration_time-{F}(V6,V3), P_generate_b_nonce-{F}(V6,V2), P_pair-{F}(V0,V6,V4), P_pair-{F}(V7,V1,V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12029: mergings( V5 == V6; #12024 ), references = 1, size of lhs = 15:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_generate_b_nonce-{F}(V1,V2), P_generate_expiration_time-{F}(V1,V3), P_pair-{F}(V0,V1,V4), P_t-{F}(V5), P_pair-{F}(V5,V1,V4), P_generate_expiration_time-{F}(V6,V3), P_generate_b_nonce-{F}(V6,V2), P_pair-{F}(V0,V6,V4), P_pair-{F}(V7,V1,V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12031: mergings( V1 == V6; #12025 ), references = 1, size of lhs = 15:
% 242.91/243.11     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V0), P_an_a_nonce-{F}(V1), P_pair-{F}(V0,V1,V0), P_generate_b_nonce-{F}(V1,V2), P_generate_expiration_time-{F}(V1,V3), P_t-{F}(V4), P_pair-{F}(V4,V1,V0), P_at-{F}(V5), P_bt-{F}(V5), P_pair-{F}(V6,V5,V0), P_generate_expiration_time-{F}(V7,V0), P_generate_b_nonce-{F}(V7,V2), P_pair-{F}(V0,V7,V0) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12034: mergings( V0 == V6; #12032 ), references = 1, size of lhs = 15:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_b-{F}(V1), P_a-{F}(V1), P_encrypt-{F}(V1,V1,V2), P_an_a_nonce-{F}(V3), P_at-{F}(V4), P_bt-{F}(V4), P_pair-{F}(V1,V3,V4), P_t-{F}(V5), P_generate_expiration_time-{F}(V6,V2), P_pair-{F}(V1,V6,V4), P_generate_b_nonce-{F}(V6,V7), P_encrypt-{F}(V7,V4,V4), P_pair-{F}(V1,V8,V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12051: mergings( V0 == V18, V1 == V17, V4 == V19, V2 == V20, V5 == V21, V6 == V22, V7 == V23, V8 == V24, V9 == V26, V10 == V27; #12038 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_a-{F}(V4), P_an_a_nonce-{F}(V5), P_pair-{F}(V4,V5,V6), P_pair-{F}(V3,V5,V7), P_t-{F}(V8), P_key-{F}(V1,V8,V9), P_key-{F}(V10,V8,V9), P_encrypt-{F}(V1,V10,V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V13,V2,V14), P_key-{F}(V6,V0,V14), P_key-{F}(V12,V4,V15), P_key-{F}(V13,V3,V16), P_key-{F}(V17,V3,V14), P_key-{F}(V17,V4,V18), P_key-{F}(V6,V1,V18), P_generate_expiration_time-{F}(V19,V11), P_pair-{F}(V1,V19,V6), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V20,V6,V6), P_pair-{F}(V1,V21,V6) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12068: mergings( V0 == V13, V1 == V14, V4 == V15, V2 == V20, V5 == V21, V6 == V22, V7 == V23, V8 == V24, V9 == V25, V10 == V26; #12055 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_generate_b_nonce-{F}(V4,V6), P_generate_expiration_time-{F}(V4,V7), P_pair-{F}(V2,V4,V8), P_pair-{F}(V3,V4,V9), P_t-{F}(V10), P_key-{F}(V11,V10,V5), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V7), P_pair-{F}(V2,V18,V8), P_generate_b_nonce-{F}(V18,V19), P_encrypt-{F}(V11,V8,V19), P_pair-{F}(V20,V11,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12079: mergings( V0 == V13, V1 == V14, V4 == V15, V2 == V20, V5 == V21, V6 == V22, V7 == V23, V8 == V24, V9 == V25, V10 == V26; #12056 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_generate_b_nonce-{F}(V4,V6), P_generate_expiration_time-{F}(V4,V7), P_pair-{F}(V2,V4,V8), P_pair-{F}(V3,V4,V9), P_t-{F}(V10), P_key-{F}(V11,V10,V5), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V7), P_pair-{F}(V2,V18,V8), P_generate_b_nonce-{F}(V18,V19), P_encrypt-{F}(V11,V8,V19), P_pair-{F}(V20,V11,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12090: mergings( V0 == V13, V1 == V14, V4 == V15, V2 == V22, V5 == V23, V6 == V24, V7 == V25, V8 == V26, V9 == V27, V10 == V28; #12057 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_key-{F}(V12,V11,V5), P_encrypt-{F}(V12,V6,V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V14,V2,V16), P_key-{F}(V15,V3,V17), P_key-{F}(V18,V3,V5), P_key-{F}(V18,V2,V19), P_key-{F}(V4,V2,V19), P_generate_expiration_time-{F}(V20,V8), P_generate_b_nonce-{F}(V20,V13), P_pair-{F}(V2,V20,V9), P_pair-{F}(V21,V12,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12153: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V47, V37 == V48, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V49, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V50, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V51, V20 == V27, V27 == V34, V34 == V42, V42 == V56, V19 == V26, V26 == V33, V33 == V41, V41 == V55; #12112 ), references = 1, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), party_of_protocol-{F}(V5), P_b-{F}(V5), P_a-{F}(V6), P_an_a_nonce-{F}(V7), P_pair-{F}(V6,V7,V8), P_pair-{F}(V5,V7,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V12,V4,V13), P_key-{F}(V8,V0,V13), P_key-{F}(V8,V2,V13), P_key-{F}(V14,V1,V13), P_encrypt-{F}(V3,V14,V15), P_key-{F}(V11,V6,V16), P_key-{F}(V12,V5,V17), P_key-{F}(V18,V5,V13), P_key-{F}(V18,V6,V19), P_key-{F}(V8,V3,V19), P_generate_expiration_time-{F}(V20,V3), P_generate_b_nonce-{F}(V20,V15), P_pair-{F}(V3,V20,V8), P_pair-{F}(V3,V21,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12192: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V49, V37 == V50, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V51, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V52, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V53, V19 == V26, V26 == V33, V33 == V41, V41 == V54, V20 == V27, V27 == V34, V34 == V42, V42 == V55; #12113 ), references = 1, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V1,V6), P_generate_b_nonce-{F}(V5,V8), P_generate_expiration_time-{F}(V5,V9), P_pair-{F}(V3,V5,V10), P_key-{F}(V10,V0,V6), P_pair-{F}(V4,V5,V11), P_t-{F}(V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V13,V3,V15), P_key-{F}(V14,V4,V16), P_key-{F}(V17,V4,V6), P_key-{F}(V17,V3,V18), P_key-{F}(V5,V3,V18), P_generate_expiration_time-{F}(V19,V9), P_pair-{F}(V3,V19,V10), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V21,V7,V20), P_pair-{F}(V21,V22,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12231: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V49, V37 == V50, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V51, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V52, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V53, V19 == V26, V26 == V33, V33 == V41, V41 == V54, V20 == V27, V27 == V34, V34 == V42, V42 == V55; #12114 ), references = 1, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_key-{F}(V7,V1,V6), P_generate_b_nonce-{F}(V5,V8), P_generate_expiration_time-{F}(V5,V9), P_pair-{F}(V3,V5,V10), P_key-{F}(V10,V0,V6), P_pair-{F}(V4,V5,V11), P_t-{F}(V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V13,V3,V15), P_key-{F}(V14,V4,V16), P_key-{F}(V17,V4,V6), P_key-{F}(V17,V3,V18), P_key-{F}(V5,V3,V18), P_generate_expiration_time-{F}(V19,V9), P_pair-{F}(V3,V19,V10), P_generate_b_nonce-{F}(V19,V20), P_encrypt-{F}(V21,V7,V20), P_pair-{F}(V21,V22,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12258: mergings( V19 == V0, V20 == V0, V21 == V0, V22 == V0, V23 == V0, V24 == V0, V0 == V26, V3 == V4, V4 == V7, V7 == V11, V11 == V13, V13 == V15, V15 == V17, V17 == V25, V5 == V8, V8 == V12, V12 == V14, V14 == V16, V16 == V18, V18 == V27, V6 == V9, V9 == V26, V10 == V26; #12232 ), references = 1, size of lhs = 13:
% 242.91/243.11     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V0), P_at-{F}(V1), P_bt-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V0,V2,V1), P_t-{F}(V3), P_encrypt-{F}(V0,V1,V4), P_generate_expiration_time-{F}(V5,V0), P_generate_b_nonce-{F}(V5,V4), P_pair-{F}(V0,V5,V1), P_pair-{F}(V0,V6,V1) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12282: mergings( V0 == V21, V21 == V22, V22 == V23, V23 == V24, V24 == V25, V25 == V20, V20 == V27, V3 == V27, V27 == V6, V6 == V10, V10 == V12, V12 == V14, V14 == V16, V16 == V26, V4 == V7, V7 == V11, V11 == V13, V13 == V15, V15 == V17, V17 == V28, V26 == V5, V5 == V8, V8 == V9; #12233 ), references = 1, size of lhs = 15:
% 242.91/243.11     P_at-{F}(V0), P_bt-{F}(V0), P_an_a_nonce-{F}(V0), P_generate_b_nonce-{F}(V0,V1), P_generate_expiration_time-{F}(V0,V2), P_a-{F}(V3), party_of_protocol-{F}(V3), P_b-{F}(V3), P_pair-{F}(V3,V0,V0), P_t-{F}(V4), P_generate_expiration_time-{F}(V5,V2), P_pair-{F}(V3,V5,V0), P_generate_b_nonce-{F}(V5,V6), P_encrypt-{F}(V7,V0,V6), P_pair-{F}(V7,V8,V0) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12306: mergings( V0 == V21, V21 == V22, V22 == V23, V23 == V24, V24 == V25, V25 == V20, V20 == V27, V3 == V27, V27 == V6, V6 == V10, V10 == V12, V12 == V14, V14 == V16, V16 == V26, V4 == V7, V7 == V11, V11 == V13, V13 == V15, V15 == V17, V17 == V28, V26 == V5, V5 == V8, V8 == V9; #12234 ), references = 1, size of lhs = 15:
% 242.91/243.11     P_at-{F}(V0), P_bt-{F}(V0), P_an_a_nonce-{F}(V0), P_generate_b_nonce-{F}(V0,V1), P_generate_expiration_time-{F}(V0,V2), P_a-{F}(V3), party_of_protocol-{F}(V3), P_b-{F}(V3), P_pair-{F}(V3,V0,V0), P_t-{F}(V4), P_generate_expiration_time-{F}(V5,V2), P_pair-{F}(V3,V5,V0), P_generate_b_nonce-{F}(V5,V6), P_encrypt-{F}(V7,V0,V6), P_pair-{F}(V7,V8,V0) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12379: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V54, V44 == V55, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V56, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V57, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V58, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V59, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V60; #12331 ), references = 1, size of lhs = 30:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_generate_b_nonce-{F}(V4,V6), P_generate_expiration_time-{F}(V4,V7), P_pair-{F}(V2,V4,V8), P_key-{F}(V8,V0,V5), P_pair-{F}(V3,V4,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V11,V2,V13), P_key-{F}(V12,V3,V14), P_key-{F}(V15,V3,V5), P_key-{F}(V15,V2,V16), P_key-{F}(V4,V2,V16), P_generate_expiration_time-{F}(V17,V7), P_generate_b_nonce-{F}(V17,V6), P_pair-{F}(V2,V17,V8), P_pair-{F}(V18,V19,V8), P_sent-{F}(V10,V10,V18,V20), P_triple-{F}(V21,V4,V7,V22), P_encrypt-{F}(V22,V12,V23), P_pair-{F}(V21,V4,V24), P_sent-{F}(V21,V3,V24,V20) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12425: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V54, V44 == V55, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V56, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V57, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V58, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V59, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V60; #12332 ), references = 1, size of lhs = 30:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_generate_b_nonce-{F}(V4,V6), P_generate_expiration_time-{F}(V4,V7), P_pair-{F}(V2,V4,V8), P_key-{F}(V8,V0,V5), P_pair-{F}(V3,V4,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V11,V2,V13), P_key-{F}(V12,V3,V14), P_key-{F}(V15,V3,V5), P_key-{F}(V15,V2,V16), P_key-{F}(V4,V2,V16), P_generate_expiration_time-{F}(V17,V7), P_generate_b_nonce-{F}(V17,V6), P_pair-{F}(V2,V17,V8), P_pair-{F}(V18,V19,V8), P_sent-{F}(V10,V10,V18,V20), P_triple-{F}(V21,V4,V7,V22), P_encrypt-{F}(V22,V12,V23), P_pair-{F}(V21,V4,V24), P_sent-{F}(V21,V3,V24,V20) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12471: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V56, V44 == V57, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V58, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V59, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V60, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V63, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V62; #12333 ), references = 1, size of lhs = 32:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_generate_b_nonce-{F}(V6,V7), P_generate_expiration_time-{F}(V6,V8), P_pair-{F}(V5,V6,V9), P_pair-{F}(V4,V6,V10), P_t-{F}(V11), P_sent-{F}(V11,V11,V2,V12), P_at-{F}(V13), P_bt-{F}(V14), P_key-{F}(V14,V3,V15), P_key-{F}(V9,V0,V15), P_key-{F}(V9,V1,V15), P_key-{F}(V13,V5,V16), P_key-{F}(V14,V4,V17), P_key-{F}(V18,V4,V15), P_key-{F}(V18,V5,V19), P_key-{F}(V9,V2,V19), P_generate_expiration_time-{F}(V20,V2), P_generate_b_nonce-{F}(V20,V7), P_pair-{F}(V2,V20,V9), P_pair-{F}(V2,V21,V9), P_triple-{F}(V22,V6,V8,V23), P_encrypt-{F}(V23,V14,V24), P_pair-{F}(V22,V6,V25), P_sent-{F}(V22,V4,V25,V12) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12486: mergings( V0 == V13, V1 == V14, V4 == V15, V2 == V20, V5 == V21, V6 == V22, V7 == V23, V8 == V24, V9 == V25, V10 == V26; #12474 ), references = 1, size of lhs = 30:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V2,V18,V9), P_pair-{F}(V19,V6,V9), P_sent-{F}(V11,V11,V9,V20), P_triple-{F}(V21,V4,V8,V22), P_encrypt-{F}(V22,V13,V23), P_pair-{F}(V21,V4,V24), P_sent-{F}(V21,V3,V24,V20) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12497: mergings( V0 == V13, V1 == V14, V4 == V15, V2 == V20, V5 == V21, V6 == V22, V7 == V23, V8 == V24, V9 == V25, V10 == V26; #12475 ), references = 1, size of lhs = 30:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V2,V18,V9), P_pair-{F}(V19,V6,V9), P_sent-{F}(V11,V11,V9,V20), P_triple-{F}(V21,V4,V8,V22), P_encrypt-{F}(V22,V13,V23), P_pair-{F}(V21,V4,V24), P_sent-{F}(V21,V3,V24,V20) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12570: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61; #12522 ), references = 1, size of lhs = 31:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_generate_b_nonce-{F}(V5,V7), P_generate_expiration_time-{F}(V5,V8), P_pair-{F}(V3,V5,V9), P_key-{F}(V9,V0,V6), P_pair-{F}(V4,V5,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V3,V14), P_key-{F}(V13,V4,V15), P_key-{F}(V16,V4,V6), P_key-{F}(V16,V3,V17), P_key-{F}(V5,V3,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V3,V18,V9), P_pair-{F}(V19,V20,V9), P_sent-{F}(V11,V1,V19,V21), P_triple-{F}(V22,V5,V8,V23), P_encrypt-{F}(V23,V13,V24), P_pair-{F}(V22,V5,V25), P_sent-{F}(V22,V4,V25,V21) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12616: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V55, V44 == V56, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V57, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V58, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V59, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V60, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V61; #12523 ), references = 1, size of lhs = 31:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), P_a-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_an_a_nonce-{F}(V5), P_key-{F}(V5,V2,V6), P_generate_b_nonce-{F}(V5,V7), P_generate_expiration_time-{F}(V5,V8), P_pair-{F}(V3,V5,V9), P_key-{F}(V9,V0,V6), P_pair-{F}(V4,V5,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V3,V14), P_key-{F}(V13,V4,V15), P_key-{F}(V16,V4,V6), P_key-{F}(V16,V3,V17), P_key-{F}(V5,V3,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V3,V18,V9), P_pair-{F}(V19,V20,V9), P_sent-{F}(V11,V1,V19,V21), P_triple-{F}(V22,V5,V8,V23), P_encrypt-{F}(V23,V13,V24), P_pair-{F}(V22,V5,V25), P_sent-{F}(V22,V4,V25,V21) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12662: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V35, V29 == V36, V35 == V43, V36 == V44, V43 == V57, V44 == V58, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V37, V37 == V45, V45 == V59, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V38, V38 == V46, V46 == V60, V13 == V18, V18 == V25, V25 == V32, V32 == V39, V39 == V47, V47 == V61, V20 == V27, V27 == V34, V34 == V41, V41 == V49, V49 == V64, V19 == V26, V26 == V33, V33 == V40, V40 == V48, V48 == V63; #12524 ), references = 1, size of lhs = 33:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), party_of_protocol-{F}(V5), P_b-{F}(V5), P_a-{F}(V6), P_an_a_nonce-{F}(V7), P_generate_b_nonce-{F}(V7,V8), P_generate_expiration_time-{F}(V7,V9), P_pair-{F}(V6,V7,V10), P_pair-{F}(V5,V7,V11), P_t-{F}(V12), P_sent-{F}(V12,V1,V3,V13), P_at-{F}(V14), P_bt-{F}(V15), P_key-{F}(V15,V4,V16), P_key-{F}(V10,V0,V16), P_key-{F}(V10,V2,V16), P_key-{F}(V14,V6,V17), P_key-{F}(V15,V5,V18), P_key-{F}(V19,V5,V16), P_key-{F}(V19,V6,V20), P_key-{F}(V10,V3,V20), P_generate_expiration_time-{F}(V21,V3), P_generate_b_nonce-{F}(V21,V8), P_pair-{F}(V3,V21,V10), P_pair-{F}(V3,V22,V10), P_triple-{F}(V23,V7,V9,V24), P_encrypt-{F}(V24,V15,V25), P_pair-{F}(V23,V7,V26), P_sent-{F}(V23,V5,V26,V13) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12711: mergings( V4 == V5, V5 == V8, V43 == V44, V8 == V12, V44 == V45, V12 == V15, V45 == V47, V15 == V19, V47 == V49, V19 == V23, V49 == V51, V23 == V28, V51 == V53, V28 == V55, V53 == V56, V6 == V9, V9 == V0, V0 == V16, V16 == V20, V20 == V24, V24 == V29, V29 == V57, V7 == V10, V10 == V13, V13 == V17, V17 == V21, V21 == V25, V25 == V30, V30 == V58, V11 == V14, V14 == V18, V18 == V22, V22 == V26, V26 == V31, V31 == V59, V38 == V39, V39 == V40, V40 == V41, V41 == V42, V42 == V60, V46 == V48, V48 == V50, V50 == V52, V52 == V54, V54 == V61; #12663 ), references = 2, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_generate_b_nonce-{F}(V4,V6), P_generate_expiration_time-{F}(V4,V7), P_pair-{F}(V2,V4,V8), P_key-{F}(V8,V0,V5), P_pair-{F}(V3,V4,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V11,V2,V13), P_key-{F}(V12,V3,V14), P_key-{F}(V15,V3,V5), P_key-{F}(V15,V2,V16), P_key-{F}(V4,V2,V16), P_generate_expiration_time-{F}(V17,V7), P_generate_b_nonce-{F}(V17,V6), P_pair-{F}(V2,V17,V8), P_triple-{F}(V10,V4,V7,V18), P_encrypt-{F}(V18,V12,V19), P_pair-{F}(V10,V4,V20), P_pair-{F}(V20,V21,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12757: mergings( V4 == V5, V5 == V8, V43 == V44, V8 == V12, V44 == V45, V12 == V15, V45 == V47, V15 == V19, V47 == V49, V19 == V23, V49 == V51, V23 == V28, V51 == V53, V28 == V55, V53 == V56, V6 == V9, V9 == V0, V0 == V16, V16 == V20, V20 == V24, V24 == V29, V29 == V57, V7 == V10, V10 == V13, V13 == V17, V17 == V21, V21 == V25, V25 == V30, V30 == V58, V11 == V14, V14 == V18, V18 == V22, V22 == V26, V26 == V31, V31 == V59, V38 == V39, V39 == V40, V40 == V41, V41 == V42, V42 == V60, V46 == V48, V48 == V50, V50 == V52, V52 == V54, V54 == V61; #12664 ), references = 2, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_generate_b_nonce-{F}(V4,V6), P_generate_expiration_time-{F}(V4,V7), P_pair-{F}(V2,V4,V8), P_key-{F}(V8,V0,V5), P_pair-{F}(V3,V4,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V11,V2,V13), P_key-{F}(V12,V3,V14), P_key-{F}(V15,V3,V5), P_key-{F}(V15,V2,V16), P_key-{F}(V4,V2,V16), P_generate_expiration_time-{F}(V17,V7), P_generate_b_nonce-{F}(V17,V6), P_pair-{F}(V2,V17,V8), P_triple-{F}(V10,V4,V7,V18), P_encrypt-{F}(V18,V12,V19), P_pair-{F}(V10,V4,V20), P_pair-{F}(V20,V21,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12803: mergings( V4 == V5, V5 == V8, V36 == V37, V8 == V12, V37 == V38, V12 == V15, V38 == V40, V15 == V19, V40 == V42, V19 == V23, V42 == V44, V23 == V28, V44 == V46, V28 == V55, V46 == V56, V6 == V9, V9 == V0, V0 == V16, V16 == V20, V20 == V24, V24 == V29, V29 == V57, V7 == V10, V10 == V13, V13 == V17, V17 == V21, V21 == V25, V25 == V30, V30 == V58, V11 == V14, V14 == V18, V18 == V22, V22 == V26, V26 == V31, V31 == V59, V39 == V41, V41 == V43, V43 == V45, V45 == V47, V47 == V62, V50 == V51, V51 == V52, V52 == V53, V53 == V54, V54 == V61; #12665 ), references = 2, size of lhs = 30:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_generate_b_nonce-{F}(V6,V7), P_generate_expiration_time-{F}(V6,V8), P_pair-{F}(V5,V6,V9), P_pair-{F}(V4,V6,V10), P_t-{F}(V11), P_pair-{F}(V11,V6,V2), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V13,V3,V14), P_key-{F}(V9,V0,V14), P_key-{F}(V9,V1,V14), P_key-{F}(V12,V5,V15), P_key-{F}(V13,V4,V16), P_key-{F}(V17,V4,V14), P_key-{F}(V17,V5,V18), P_key-{F}(V9,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V7), P_pair-{F}(V2,V19,V9), P_pair-{F}(V2,V20,V9), P_triple-{F}(V11,V6,V8,V21), P_encrypt-{F}(V21,V13,V22) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12866: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V46, V37 == V47, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V48, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V49, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V50, V20 == V27, V27 == V34, V34 == V42, V42 == V53, V19 == V26, V26 == V33, V33 == V41, V41 == V52; #12825 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_pair-{F}(V5,V6,V7), P_pair-{F}(V4,V6,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V11,V3,V12), P_key-{F}(V7,V0,V12), P_key-{F}(V7,V1,V12), P_key-{F}(V10,V5,V13), P_key-{F}(V11,V4,V14), P_key-{F}(V15,V4,V12), P_key-{F}(V15,V5,V16), P_key-{F}(V7,V2,V16), P_generate_expiration_time-{F}(V17,V2), P_pair-{F}(V2,V17,V7), P_generate_b_nonce-{F}(V17,V18), P_triple-{F}(V2,V7,V2,V18), P_pair-{F}(V2,V19,V7) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12905: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V47, V37 == V48, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V49, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V50, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V51, V19 == V26, V26 == V33, V33 == V41, V41 == V52, V20 == V27, V27 == V34, V34 == V42, V42 == V53; #12826 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_generate_b_nonce-{F}(V4,V6), P_generate_expiration_time-{F}(V4,V7), P_pair-{F}(V2,V4,V8), P_key-{F}(V8,V0,V5), P_pair-{F}(V3,V4,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V11,V2,V13), P_key-{F}(V12,V3,V14), P_key-{F}(V15,V3,V5), P_key-{F}(V15,V2,V16), P_key-{F}(V4,V2,V16), P_generate_expiration_time-{F}(V17,V7), P_pair-{F}(V2,V17,V8), P_generate_b_nonce-{F}(V17,V18), P_triple-{F}(V19,V8,V19,V18), P_pair-{F}(V19,V20,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #12944: mergings( V4 == V5, V5 == V9, V6 == V10, V9 == V14, V10 == V15, V14 == V21, V15 == V22, V21 == V28, V22 == V29, V28 == V36, V29 == V37, V36 == V47, V37 == V48, V7 == V11, V11 == V16, V16 == V23, V23 == V30, V30 == V38, V38 == V49, V8 == V12, V12 == V17, V17 == V24, V24 == V31, V31 == V39, V39 == V50, V13 == V18, V18 == V25, V25 == V32, V32 == V40, V40 == V51, V19 == V26, V26 == V33, V33 == V41, V41 == V52, V20 == V27, V27 == V34, V34 == V42, V42 == V53; #12827 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_generate_b_nonce-{F}(V4,V6), P_generate_expiration_time-{F}(V4,V7), P_pair-{F}(V2,V4,V8), P_key-{F}(V8,V0,V5), P_pair-{F}(V3,V4,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V11,V2,V13), P_key-{F}(V12,V3,V14), P_key-{F}(V15,V3,V5), P_key-{F}(V15,V2,V16), P_key-{F}(V4,V2,V16), P_generate_expiration_time-{F}(V17,V7), P_pair-{F}(V2,V17,V8), P_generate_b_nonce-{F}(V17,V18), P_triple-{F}(V19,V8,V19,V18), P_pair-{F}(V19,V20,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13125: exists( #39, #12711 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_generate_b_nonce-{F}(V4,V6), P_generate_expiration_time-{F}(V4,V7), P_pair-{F}(V2,V4,V8), P_key-{F}(V8,V0,V5), P_pair-{F}(V3,V4,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V11,V2,V13), P_key-{F}(V12,V3,V14), P_key-{F}(V15,V3,V5), P_key-{F}(V15,V2,V16), P_key-{F}(V4,V2,V16), P_generate_expiration_time-{F}(V17,V7), P_generate_b_nonce-{F}(V17,V6), P_pair-{F}(V2,V17,V8), P_triple-{F}(V10,V4,V7,V18), P_pair-{F}(V10,V4,V19), P_pair-{F}(V19,V20,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13126: exists( #39, #12757 ), references = 1, size of lhs = 27:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_generate_b_nonce-{F}(V4,V6), P_generate_expiration_time-{F}(V4,V7), P_pair-{F}(V2,V4,V8), P_key-{F}(V8,V0,V5), P_pair-{F}(V3,V4,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V11,V2,V13), P_key-{F}(V12,V3,V14), P_key-{F}(V15,V3,V5), P_key-{F}(V15,V2,V16), P_key-{F}(V4,V2,V16), P_generate_expiration_time-{F}(V17,V7), P_generate_b_nonce-{F}(V17,V6), P_pair-{F}(V2,V17,V8), P_triple-{F}(V10,V4,V7,V18), P_pair-{F}(V10,V4,V19), P_pair-{F}(V19,V20,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13127: exists( #39, #12803 ), references = 1, size of lhs = 29:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_generate_b_nonce-{F}(V6,V7), P_generate_expiration_time-{F}(V6,V8), P_pair-{F}(V5,V6,V9), P_pair-{F}(V4,V6,V10), P_t-{F}(V11), P_pair-{F}(V11,V6,V2), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V13,V3,V14), P_key-{F}(V9,V0,V14), P_key-{F}(V9,V1,V14), P_key-{F}(V12,V5,V15), P_key-{F}(V13,V4,V16), P_key-{F}(V17,V4,V14), P_key-{F}(V17,V5,V18), P_key-{F}(V9,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V7), P_pair-{F}(V2,V19,V9), P_pair-{F}(V2,V20,V9), P_triple-{F}(V11,V6,V8,V21) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13131: exists( #41, #13122 ), references = 2, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_generate_b_nonce-{F}(V4,V6), P_generate_expiration_time-{F}(V4,V7), P_pair-{F}(V2,V4,V8), P_key-{F}(V8,V0,V5), P_pair-{F}(V3,V4,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V11,V2,V13), P_key-{F}(V12,V3,V14), P_key-{F}(V15,V3,V5), P_key-{F}(V15,V2,V16), P_key-{F}(V4,V2,V16), P_generate_expiration_time-{F}(V17,V7), P_generate_b_nonce-{F}(V17,V6), P_pair-{F}(V2,V17,V8), P_pair-{F}(V10,V4,V18), P_pair-{F}(V18,V19,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13132: exists( #41, #13123 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_generate_b_nonce-{F}(V4,V6), P_generate_expiration_time-{F}(V4,V7), P_pair-{F}(V2,V4,V8), P_key-{F}(V8,V0,V5), P_pair-{F}(V3,V4,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V11,V2,V13), P_key-{F}(V12,V3,V14), P_key-{F}(V15,V3,V5), P_key-{F}(V15,V2,V16), P_key-{F}(V4,V2,V16), P_generate_expiration_time-{F}(V17,V7), P_generate_b_nonce-{F}(V17,V6), P_pair-{F}(V2,V17,V8), P_pair-{F}(V10,V4,V18), P_pair-{F}(V18,V19,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13133: exists( #41, #13124 ), references = 1, size of lhs = 28:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), party_of_protocol-{F}(V3), party_of_protocol-{F}(V4), P_b-{F}(V4), P_a-{F}(V5), P_an_a_nonce-{F}(V6), P_generate_b_nonce-{F}(V6,V7), P_generate_expiration_time-{F}(V6,V8), P_pair-{F}(V5,V6,V9), P_pair-{F}(V4,V6,V10), P_t-{F}(V11), P_pair-{F}(V11,V6,V2), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V13,V3,V14), P_key-{F}(V9,V0,V14), P_key-{F}(V9,V1,V14), P_key-{F}(V12,V5,V15), P_key-{F}(V13,V4,V16), P_key-{F}(V17,V4,V14), P_key-{F}(V17,V5,V18), P_key-{F}(V9,V2,V18), P_generate_expiration_time-{F}(V19,V2), P_generate_b_nonce-{F}(V19,V7), P_pair-{F}(V2,V19,V9), P_pair-{F}(V2,V20,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13138: mergings( V0 == V5; #13134 ), references = 1, size of lhs = 15:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_pair-{F}(V0,V1,V1), P_generate_b_nonce-{F}(V1,V2), P_generate_expiration_time-{F}(V1,V3), P_t-{F}(V4), P_generate_expiration_time-{F}(V5,V3), P_generate_b_nonce-{F}(V5,V2), P_pair-{F}(V0,V5,V1), P_pair-{F}(V4,V1,V6), P_pair-{F}(V6,V7,V1) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13140: mergings( V0 == V5; #13135 ), references = 1, size of lhs = 15:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_pair-{F}(V0,V1,V1), P_generate_b_nonce-{F}(V1,V2), P_generate_expiration_time-{F}(V1,V3), P_t-{F}(V4), P_generate_expiration_time-{F}(V5,V3), P_generate_b_nonce-{F}(V5,V2), P_pair-{F}(V0,V5,V1), P_pair-{F}(V4,V1,V6), P_pair-{F}(V6,V7,V1) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13142: mergings( V0 == V6; #13136 ), references = 1, size of lhs = 15:
% 242.91/243.11     party_of_protocol-{F}(V0), P_b-{F}(V0), P_a-{F}(V0), P_an_a_nonce-{F}(V1), P_generate_b_nonce-{F}(V1,V2), P_generate_expiration_time-{F}(V1,V3), P_at-{F}(V4), P_bt-{F}(V4), P_pair-{F}(V0,V1,V4), P_t-{F}(V5), P_pair-{F}(V5,V1,V0), P_generate_expiration_time-{F}(V6,V0), P_generate_b_nonce-{F}(V6,V2), P_pair-{F}(V0,V6,V4), P_pair-{F}(V0,V7,V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13145: exists( #39, #11819 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V2,V18,V9), P_pair-{F}(V19,V6,V9), P_triple-{F}(V2,V4,V8,V20) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13146: exists( #39, #11851 ), references = 1, size of lhs = 26:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V2,V18,V9), P_pair-{F}(V19,V6,V9), P_triple-{F}(V2,V4,V8,V20) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13149: exists( #41, #13143 ), references = 2, size of lhs = 25:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V2,V18,V9), P_pair-{F}(V19,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13150: exists( #41, #13144 ), references = 2, size of lhs = 25:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V13,V3,V15), P_key-{F}(V16,V3,V5), P_key-{F}(V16,V2,V17), P_key-{F}(V4,V2,V17), P_generate_expiration_time-{F}(V18,V8), P_generate_b_nonce-{F}(V18,V7), P_pair-{F}(V2,V18,V9), P_pair-{F}(V19,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13154: mergings( V5 == V6; #13151 ), references = 1, size of lhs = 14:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_generate_b_nonce-{F}(V1,V2), P_generate_expiration_time-{F}(V1,V3), P_pair-{F}(V0,V1,V4), P_t-{F}(V5), P_generate_expiration_time-{F}(V6,V3), P_generate_b_nonce-{F}(V6,V2), P_pair-{F}(V0,V6,V4), P_pair-{F}(V7,V1,V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13156: mergings( V5 == V6; #13152 ), references = 1, size of lhs = 14:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_generate_b_nonce-{F}(V1,V2), P_generate_expiration_time-{F}(V1,V3), P_pair-{F}(V0,V1,V4), P_t-{F}(V5), P_generate_expiration_time-{F}(V6,V3), P_generate_b_nonce-{F}(V6,V2), P_pair-{F}(V0,V6,V4), P_pair-{F}(V7,V1,V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13159: exists( #37, #13151 ), references = 1, size of lhs = 9:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_generate_expiration_time-{F}(V1,V3), P_generate_b_nonce-{F}(V1,V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13160: exists( #37, #13152 ), references = 1, size of lhs = 9:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_generate_expiration_time-{F}(V1,V3), P_generate_b_nonce-{F}(V1,V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13163: exists( #45, #13157 ), references = 1, size of lhs = 8:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_generate_b_nonce-{F}(V1,V3) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13164: exists( #45, #13158 ), references = 1, size of lhs = 8:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2), P_generate_b_nonce-{F}(V1,V3) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13167: exists( #44, #13161 ), references = 1, size of lhs = 7:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_bt-{F}(V1), P_t-{F}(V2) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13171: exists( #47, #13149 ), references = 3, size of lhs = 24:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V15,V3,V5), P_key-{F}(V15,V2,V16), P_key-{F}(V4,V2,V16), P_generate_expiration_time-{F}(V17,V8), P_generate_b_nonce-{F}(V17,V7), P_pair-{F}(V2,V17,V9), P_pair-{F}(V18,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13172: exists( #47, #13150 ), references = 2, size of lhs = 24:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V15,V3,V5), P_key-{F}(V15,V2,V16), P_key-{F}(V4,V2,V16), P_generate_expiration_time-{F}(V17,V8), P_generate_b_nonce-{F}(V17,V7), P_pair-{F}(V2,V17,V9), P_pair-{F}(V18,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13173: exists( #47, #13131 ), references = 2, size of lhs = 25:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), party_of_protocol-{F}(V3), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_generate_b_nonce-{F}(V4,V6), P_generate_expiration_time-{F}(V4,V7), P_pair-{F}(V2,V4,V8), P_key-{F}(V8,V0,V5), P_pair-{F}(V3,V4,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V11,V2,V13), P_key-{F}(V14,V3,V5), P_key-{F}(V14,V2,V15), P_key-{F}(V4,V2,V15), P_generate_expiration_time-{F}(V16,V7), P_generate_b_nonce-{F}(V16,V6), P_pair-{F}(V2,V16,V8), P_pair-{F}(V10,V4,V17), P_pair-{F}(V17,V18,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13177: mergings( V5 == V13; #13174 ), references = 2, size of lhs = 16:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V2), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_key-{F}(V3,V1,V4), P_key-{F}(V3,V0,V4), P_key-{F}(V3,V2,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V6,V2,V8), P_key-{F}(V9,V2,V4), P_generate_expiration_time-{F}(V3,V10), P_generate_b_nonce-{F}(V3,V11) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13179: mergings( V5 == V13; #13175 ), references = 2, size of lhs = 16:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V2), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_key-{F}(V3,V1,V4), P_key-{F}(V3,V0,V4), P_key-{F}(V3,V2,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V6,V2,V8), P_key-{F}(V9,V2,V4), P_generate_expiration_time-{F}(V3,V10), P_generate_b_nonce-{F}(V3,V11) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13182: exists( #47, #13174 ), references = 1, size of lhs = 9:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_t-{F}(V2), P_bt-{F}(V3), P_generate_expiration_time-{F}(V1,V4), P_generate_b_nonce-{F}(V1,V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13183: exists( #47, #13175 ), references = 1, size of lhs = 9:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_t-{F}(V2), P_bt-{F}(V3), P_generate_expiration_time-{F}(V1,V4), P_generate_b_nonce-{F}(V1,V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13186: exists( #45, #13180 ), references = 1, size of lhs = 8:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_t-{F}(V2), P_bt-{F}(V3), P_generate_b_nonce-{F}(V1,V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13187: exists( #45, #13181 ), references = 1, size of lhs = 8:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_t-{F}(V2), P_bt-{F}(V3), P_generate_b_nonce-{F}(V1,V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13190: exists( #44, #13184 ), references = 1, size of lhs = 7:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_t-{F}(V2), P_bt-{F}(V3) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13193: exists( #46, #13188 ), references = 1, size of lhs = 6:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_at-{F}(V1), P_t-{F}(V2) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13197: exists( #47, #13177 ), references = 1, size of lhs = 15:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V2), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_key-{F}(V3,V1,V4), P_key-{F}(V3,V0,V4), P_key-{F}(V3,V2,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V8,V2,V4), P_generate_expiration_time-{F}(V3,V9), P_generate_b_nonce-{F}(V3,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13198: exists( #47, #13179 ), references = 1, size of lhs = 15:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V2), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_key-{F}(V3,V1,V4), P_key-{F}(V3,V0,V4), P_key-{F}(V3,V2,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V8,V2,V4), P_generate_expiration_time-{F}(V3,V9), P_generate_b_nonce-{F}(V3,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13199: exists( #47, #5192 ), references = 1, size of lhs = 17:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), P_a-{F}(V2), party_of_protocol-{F}(V2), P_b-{F}(V2), P_an_a_nonce-{F}(V3), P_key-{F}(V3,V1,V4), P_key-{F}(V3,V0,V4), P_key-{F}(V3,V2,V4), P_t-{F}(V5), P_at-{F}(V6), P_bt-{F}(V7), P_key-{F}(V7,V2,V8), P_key-{F}(V9,V2,V4), P_generate_expiration_time-{F}(V3,V10), P_generate_b_nonce-{F}(V3,V11), P_pair-{F}(V3,V2,V11) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13203: exists( #47, #13194 ), references = 1, size of lhs = 9:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_t-{F}(V2), P_at-{F}(V3), P_bt-{F}(V4), P_generate_expiration_time-{F}(V1,V5), P_generate_b_nonce-{F}(V1,V6) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13204: exists( #47, #13195 ), references = 1, size of lhs = 9:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_t-{F}(V2), P_at-{F}(V3), P_bt-{F}(V4), P_generate_expiration_time-{F}(V1,V5), P_generate_b_nonce-{F}(V1,V6) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13207: exists( #45, #13200 ), references = 1, size of lhs = 8:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_t-{F}(V2), P_at-{F}(V3), P_bt-{F}(V4), P_generate_b_nonce-{F}(V1,V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13208: exists( #45, #13201 ), references = 1, size of lhs = 8:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_t-{F}(V2), P_at-{F}(V3), P_bt-{F}(V4), P_generate_b_nonce-{F}(V1,V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13211: exists( #44, #13205 ), references = 1, size of lhs = 7:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_t-{F}(V2), P_at-{F}(V3), P_bt-{F}(V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13214: exists( #46, #13209 ), references = 1, size of lhs = 6:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_t-{F}(V2), P_at-{F}(V3) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13217: exists( #43, #13212 ), references = 1, size of lhs = 5:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1), P_t-{F}(V2) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13220: exists( #40, #13215 ), references = 1, size of lhs = 4:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0), P_an_a_nonce-{F}(V1) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13223: exists( #38, #13218 ), references = 1, size of lhs = 3:
% 242.91/243.11     P_a-{F}(V0), party_of_protocol-{F}(V0), P_b-{F}(V0) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13236: mergings( V0 == V9, V4 == V11, V2 == V16, V10 == V17, V5 == V18, V6 == V19; #13227 ), references = 2, size of lhs = 23:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V15,V3,V5), P_key-{F}(V15,V2,V16), P_key-{F}(V4,V2,V16), P_generate_expiration_time-{F}(V17,V8), P_generate_b_nonce-{F}(V17,V7), P_pair-{F}(V2,V17,V9), P_pair-{F}(V18,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13243: mergings( V0 == V9, V4 == V11, V2 == V16, V10 == V17, V5 == V18, V6 == V19; #13228 ), references = 2, size of lhs = 23:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_key-{F}(V6,V0,V5), P_generate_b_nonce-{F}(V4,V7), P_generate_expiration_time-{F}(V4,V8), P_pair-{F}(V2,V4,V9), P_pair-{F}(V3,V4,V10), P_t-{F}(V11), P_at-{F}(V12), P_bt-{F}(V13), P_key-{F}(V12,V2,V14), P_key-{F}(V15,V3,V5), P_key-{F}(V15,V2,V16), P_key-{F}(V4,V2,V16), P_generate_expiration_time-{F}(V17,V8), P_generate_b_nonce-{F}(V17,V7), P_pair-{F}(V2,V17,V9), P_pair-{F}(V18,V6,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13250: mergings( V0 == V9, V4 == V11, V2 == V15, V10 == V16, V5 == V17, V6 == V18; #13229 ), references = 1, size of lhs = 24:
% 242.91/243.11     party_of_protocol-{F}(V0), party_of_protocol-{F}(V1), party_of_protocol-{F}(V2), P_a-{F}(V2), P_b-{F}(V3), P_an_a_nonce-{F}(V4), P_key-{F}(V4,V1,V5), P_generate_b_nonce-{F}(V4,V6), P_generate_expiration_time-{F}(V4,V7), P_pair-{F}(V2,V4,V8), P_key-{F}(V8,V0,V5), P_pair-{F}(V3,V4,V9), P_t-{F}(V10), P_at-{F}(V11), P_bt-{F}(V12), P_key-{F}(V11,V2,V13), P_key-{F}(V14,V3,V5), P_key-{F}(V14,V2,V15), P_key-{F}(V4,V2,V15), P_generate_expiration_time-{F}(V16,V7), P_generate_b_nonce-{F}(V16,V6), P_pair-{F}(V2,V16,V8), P_pair-{F}(V10,V4,V17), P_pair-{F}(V17,V18,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13263: mergings( V0 == V7, V4 == V9, V2 == V14, V8 == V15, V5 == V16, V6 == V17; #13254 ), references = 2, size of lhs = 21:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_key-{F}(V2,V1,V3), P_key-{F}(V4,V1,V3), P_generate_b_nonce-{F}(V2,V5), P_generate_expiration_time-{F}(V2,V6), P_pair-{F}(V0,V2,V7), P_pair-{F}(V1,V2,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V10,V0,V12), P_key-{F}(V13,V1,V3), P_key-{F}(V13,V0,V14), P_key-{F}(V2,V0,V14), P_generate_expiration_time-{F}(V15,V6), P_generate_b_nonce-{F}(V15,V5), P_pair-{F}(V0,V15,V7), P_pair-{F}(V16,V4,V7) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13271: mergings( V0 == V8, V1 == V9, V4 == V10, V2 == V15, V5 == V16, V6 == V17, V7 == V18; #13255 ), references = 2, size of lhs = 21:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_key-{F}(V2,V1,V3), P_key-{F}(V4,V1,V3), P_generate_b_nonce-{F}(V2,V5), P_generate_expiration_time-{F}(V2,V6), P_pair-{F}(V0,V2,V7), P_pair-{F}(V1,V2,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V10,V0,V12), P_key-{F}(V13,V1,V3), P_key-{F}(V13,V0,V14), P_key-{F}(V2,V0,V14), P_generate_expiration_time-{F}(V15,V6), P_generate_b_nonce-{F}(V15,V5), P_pair-{F}(V0,V15,V7), P_pair-{F}(V16,V4,V7) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13279: mergings( V0 == V8, V1 == V9, V4 == V10, V2 == V15, V5 == V16, V6 == V17, V7 == V18; #13256 ), references = 2, size of lhs = 21:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_key-{F}(V2,V1,V3), P_key-{F}(V4,V1,V3), P_generate_b_nonce-{F}(V2,V5), P_generate_expiration_time-{F}(V2,V6), P_pair-{F}(V0,V2,V7), P_pair-{F}(V1,V2,V8), P_t-{F}(V9), P_at-{F}(V10), P_bt-{F}(V11), P_key-{F}(V10,V0,V12), P_key-{F}(V13,V1,V3), P_key-{F}(V13,V0,V14), P_key-{F}(V2,V0,V14), P_generate_expiration_time-{F}(V15,V6), P_generate_b_nonce-{F}(V15,V5), P_pair-{F}(V0,V15,V7), P_pair-{F}(V16,V4,V7) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13289: mergings( V3 == V1, V4 == V0, V5 == V14, V9 == V15, V6 == V16, V7 == V0; #13280 ), references = 1, size of lhs = 17:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_generate_b_nonce-{F}(V2,V3), P_generate_expiration_time-{F}(V2,V4), P_pair-{F}(V0,V2,V5), P_pair-{F}(V1,V2,V6), P_t-{F}(V7), P_bt-{F}(V8), P_key-{F}(V2,V1,V9), P_key-{F}(V10,V1,V9), P_generate_expiration_time-{F}(V11,V4), P_generate_b_nonce-{F}(V11,V3), P_pair-{F}(V0,V11,V5), P_pair-{F}(V12,V10,V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13297: mergings( V3 == V1, V4 == V10, V5 == V0, V6 == V15, V7 == V16, V8 == V17, V9 == V0; #13281 ), references = 1, size of lhs = 17:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_key-{F}(V2,V1,V3), P_key-{F}(V4,V1,V3), P_generate_b_nonce-{F}(V2,V5), P_generate_expiration_time-{F}(V2,V6), P_pair-{F}(V0,V2,V7), P_pair-{F}(V1,V2,V8), P_t-{F}(V9), P_bt-{F}(V10), P_generate_expiration_time-{F}(V11,V6), P_generate_b_nonce-{F}(V11,V5), P_pair-{F}(V0,V11,V7), P_pair-{F}(V12,V4,V7) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13305: mergings( V3 == V1, V4 == V10, V5 == V0, V6 == V15, V7 == V16, V8 == V17, V9 == V0; #13282 ), references = 1, size of lhs = 17:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_key-{F}(V2,V1,V3), P_key-{F}(V4,V1,V3), P_generate_b_nonce-{F}(V2,V5), P_generate_expiration_time-{F}(V2,V6), P_pair-{F}(V0,V2,V7), P_pair-{F}(V1,V2,V8), P_t-{F}(V9), P_bt-{F}(V10), P_generate_expiration_time-{F}(V11,V6), P_generate_b_nonce-{F}(V11,V5), P_pair-{F}(V0,V11,V7), P_pair-{F}(V12,V4,V7) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13312: mergings( V6 == V9, V3 == V10, V4 == V1; #13306 ), references = 1, size of lhs = 11:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_pair-{F}(V1,V2,V3), P_t-{F}(V4), P_bt-{F}(V5), P_key-{F}(V2,V1,V6), P_generate_expiration_time-{F}(V2,V7), P_generate_b_nonce-{F}(V2,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13317: mergings( V3 == V7, V4 == V11, V5 == V12, V6 == V1; #13307 ), references = 1, size of lhs = 11:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_key-{F}(V2,V1,V3), P_pair-{F}(V1,V2,V4), P_t-{F}(V5), P_bt-{F}(V6), P_generate_expiration_time-{F}(V2,V7), P_generate_b_nonce-{F}(V2,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13322: mergings( V3 == V7, V4 == V11, V5 == V12, V6 == V1; #13308 ), references = 1, size of lhs = 11:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_key-{F}(V2,V1,V3), P_pair-{F}(V1,V2,V4), P_t-{F}(V5), P_bt-{F}(V6), P_generate_expiration_time-{F}(V2,V7), P_generate_b_nonce-{F}(V2,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13329: mergings( V6 == V7, V3 == V8, V4 == V0; #13323 ), references = 1, size of lhs = 10:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_pair-{F}(V1,V2,V3), P_t-{F}(V4), P_bt-{F}(V5), P_generate_expiration_time-{F}(V2,V6), P_generate_b_nonce-{F}(V2,V7) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13333: mergings( V6 == V7, V3 == V8, V4 == V0; #13324 ), references = 1, size of lhs = 10:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_pair-{F}(V1,V2,V3), P_t-{F}(V4), P_bt-{F}(V5), P_generate_expiration_time-{F}(V2,V6), P_generate_b_nonce-{F}(V2,V7) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13337: mergings( V6 == V7, V3 == V8, V4 == V0; #13325 ), references = 1, size of lhs = 10:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_pair-{F}(V1,V2,V3), P_t-{F}(V4), P_bt-{F}(V5), P_generate_expiration_time-{F}(V2,V6), P_generate_b_nonce-{F}(V2,V7) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13343: mergings( V3 == V6, V4 == V1; #13338 ), references = 1, size of lhs = 9:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_t-{F}(V3), P_bt-{F}(V4), P_generate_expiration_time-{F}(V2,V5), P_generate_b_nonce-{F}(V2,V6) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13346: mergings( V3 == V6, V4 == V1; #13339 ), references = 1, size of lhs = 9:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_t-{F}(V3), P_bt-{F}(V4), P_generate_expiration_time-{F}(V2,V5), P_generate_b_nonce-{F}(V2,V6) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13349: mergings( V3 == V6, V4 == V1; #13340 ), references = 1, size of lhs = 9:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_t-{F}(V3), P_bt-{F}(V4), P_generate_expiration_time-{F}(V2,V5), P_generate_b_nonce-{F}(V2,V6) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13355: mergings( V2 == V6, V3 == V0; #13350 ), references = 1, size of lhs = 8:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_t-{F}(V3), P_bt-{F}(V4), P_generate_b_nonce-{F}(V2,V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13358: mergings( V2 == V6, V3 == V0; #13351 ), references = 1, size of lhs = 8:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_t-{F}(V3), P_bt-{F}(V4), P_generate_b_nonce-{F}(V2,V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13361: mergings( V2 == V6, V3 == V0; #13352 ), references = 1, size of lhs = 8:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_t-{F}(V3), P_bt-{F}(V4), P_generate_b_nonce-{F}(V2,V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13367: mergings( V2 == V6, V3 == V0; #13362 ), references = 1, size of lhs = 7:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_t-{F}(V3), P_bt-{F}(V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13373: mergings( V1 == V6, V2 == V5; #13368 ), references = 1, size of lhs = 6:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_at-{F}(V2), P_t-{F}(V3) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13377: exists( #47, #13263 ), references = 1, size of lhs = 18:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_generate_b_nonce-{F}(V2,V3), P_generate_expiration_time-{F}(V2,V4), P_pair-{F}(V0,V2,V5), P_pair-{F}(V1,V2,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V8,V0,V10), P_key-{F}(V2,V1,V11), P_key-{F}(V12,V1,V11), P_generate_expiration_time-{F}(V13,V4), P_generate_b_nonce-{F}(V13,V3), P_pair-{F}(V0,V13,V5), P_pair-{F}(V14,V12,V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13378: exists( #47, #13271 ), references = 1, size of lhs = 18:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_generate_b_nonce-{F}(V2,V3), P_generate_expiration_time-{F}(V2,V4), P_pair-{F}(V0,V2,V5), P_pair-{F}(V1,V2,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V8,V0,V10), P_key-{F}(V2,V1,V11), P_key-{F}(V12,V1,V11), P_generate_expiration_time-{F}(V13,V4), P_generate_b_nonce-{F}(V13,V3), P_pair-{F}(V0,V13,V5), P_pair-{F}(V14,V12,V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13379: exists( #47, #13279 ), references = 1, size of lhs = 18:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_generate_b_nonce-{F}(V2,V3), P_generate_expiration_time-{F}(V2,V4), P_pair-{F}(V0,V2,V5), P_pair-{F}(V1,V2,V6), P_t-{F}(V7), P_at-{F}(V8), P_bt-{F}(V9), P_key-{F}(V8,V0,V10), P_key-{F}(V2,V1,V11), P_key-{F}(V12,V1,V11), P_generate_expiration_time-{F}(V13,V4), P_generate_b_nonce-{F}(V13,V3), P_pair-{F}(V0,V13,V5), P_pair-{F}(V14,V12,V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13383: exists( #37, #13374 ), references = 1, size of lhs = 12:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_t-{F}(V4), P_at-{F}(V5), P_bt-{F}(V6), P_key-{F}(V5,V0,V7), P_key-{F}(V2,V1,V8), P_generate_expiration_time-{F}(V2,V9), P_generate_b_nonce-{F}(V2,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13384: exists( #37, #13375 ), references = 1, size of lhs = 12:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_t-{F}(V4), P_at-{F}(V5), P_bt-{F}(V6), P_key-{F}(V5,V0,V7), P_key-{F}(V2,V1,V8), P_generate_expiration_time-{F}(V2,V9), P_generate_b_nonce-{F}(V2,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13385: exists( #37, #13376 ), references = 1, size of lhs = 12:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_t-{F}(V4), P_at-{F}(V5), P_bt-{F}(V6), P_key-{F}(V5,V0,V7), P_key-{F}(V2,V1,V8), P_generate_expiration_time-{F}(V2,V9), P_generate_b_nonce-{F}(V2,V10) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13389: exists( #47, #13380 ), references = 1, size of lhs = 11:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_t-{F}(V4), P_at-{F}(V5), P_bt-{F}(V6), P_key-{F}(V5,V0,V7), P_generate_expiration_time-{F}(V2,V8), P_generate_b_nonce-{F}(V2,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13390: exists( #47, #13381 ), references = 1, size of lhs = 11:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_t-{F}(V4), P_at-{F}(V5), P_bt-{F}(V6), P_key-{F}(V5,V0,V7), P_generate_expiration_time-{F}(V2,V8), P_generate_b_nonce-{F}(V2,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13391: exists( #47, #13382 ), references = 1, size of lhs = 11:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_pair-{F}(V1,V2,V3), P_t-{F}(V4), P_at-{F}(V5), P_bt-{F}(V6), P_key-{F}(V5,V0,V7), P_generate_expiration_time-{F}(V2,V8), P_generate_b_nonce-{F}(V2,V9) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13395: exists( #37, #13386 ), references = 1, size of lhs = 10:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_t-{F}(V3), P_at-{F}(V4), P_bt-{F}(V5), P_key-{F}(V4,V0,V6), P_generate_expiration_time-{F}(V2,V7), P_generate_b_nonce-{F}(V2,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13396: exists( #37, #13387 ), references = 1, size of lhs = 10:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_t-{F}(V3), P_at-{F}(V4), P_bt-{F}(V5), P_key-{F}(V4,V0,V6), P_generate_expiration_time-{F}(V2,V7), P_generate_b_nonce-{F}(V2,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13397: exists( #37, #13388 ), references = 1, size of lhs = 10:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_t-{F}(V3), P_at-{F}(V4), P_bt-{F}(V5), P_key-{F}(V4,V0,V6), P_generate_expiration_time-{F}(V2,V7), P_generate_b_nonce-{F}(V2,V8) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13401: exists( #45, #13392 ), references = 1, size of lhs = 9:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_t-{F}(V3), P_at-{F}(V4), P_bt-{F}(V5), P_key-{F}(V4,V0,V6), P_generate_b_nonce-{F}(V2,V7) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13402: exists( #45, #13393 ), references = 1, size of lhs = 9:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_t-{F}(V3), P_at-{F}(V4), P_bt-{F}(V5), P_key-{F}(V4,V0,V6), P_generate_b_nonce-{F}(V2,V7) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13403: exists( #45, #13394 ), references = 1, size of lhs = 9:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_t-{F}(V3), P_at-{F}(V4), P_bt-{F}(V5), P_key-{F}(V4,V0,V6), P_generate_b_nonce-{F}(V2,V7) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13407: exists( #44, #13398 ), references = 1, size of lhs = 8:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_t-{F}(V3), P_at-{F}(V4), P_bt-{F}(V5), P_key-{F}(V4,V0,V6) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13408: exists( #44, #13399 ), references = 1, size of lhs = 8:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_t-{F}(V3), P_at-{F}(V4), P_bt-{F}(V5), P_key-{F}(V4,V0,V6) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13409: exists( #44, #13400 ), references = 1, size of lhs = 8:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_t-{F}(V3), P_at-{F}(V4), P_bt-{F}(V5), P_key-{F}(V4,V0,V6) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13413: exists( #47, #13404 ), references = 1, size of lhs = 7:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_t-{F}(V3), P_at-{F}(V4), P_bt-{F}(V5) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13417: exists( #46, #13410 ), references = 1, size of lhs = 6:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_t-{F}(V3), P_at-{F}(V4) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13421: exists( #43, #13414 ), references = 1, size of lhs = 5:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2), P_t-{F}(V3) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13425: exists( #40, #13418 ), references = 1, size of lhs = 4:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1), P_an_a_nonce-{F}(V2) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13429: exists( #38, #13422 ), references = 1, size of lhs = 3:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0), P_b-{F}(V1) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13433: exists( #36, #13426 ), references = 1, size of lhs = 2:
% 242.91/243.11     party_of_protocol-{F}(V0), P_a-{F}(V0) | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  #13440: exists( #34, #13434 ), references = 1, size of lhs = 0:
% 242.91/243.11     FALSE | FALSE
% 242.91/243.11        (used 0 times, uses = {})
% 242.91/243.11  
% 242.91/243.11  number of learnt formulas = 389
% 242.91/243.11  
% 242.91/243.11  
% 242.91/243.11  % SZS output end Refutation for /export/starexec/sandbox2/benchmark/theBenchmark.p
% 242.91/243.11  
% 242.91/243.11  randbase = 1
%------------------------------------------------------------------------------