TSTP Solution File: SWW968+1 by Vampire---4.8

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Vampire---4.8
% Problem  : SWW968+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t %d %s

% Computer : n004.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Wed May  1 04:32:46 EDT 2024

% Result   : Theorem 0.61s 0.82s
% Output   : Refutation 0.61s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :   13
%            Number of leaves      :   30
% Syntax   : Number of formulae    :  141 (  23 unt;   0 def)
%            Number of atoms       :  444 (  12 equ)
%            Maximal formula atoms :    9 (   3 avg)
%            Number of connectives :  555 ( 252   ~; 230   |;  36   &)
%                                         (   9 <=>;  28  =>;   0  <=;   0 <~>)
%            Maximal formula depth :   15 (   6 avg)
%            Maximal term depth    :    5 (   2 avg)
%            Number of predicates  :   13 (  11 usr;  10 prp; 0-2 aty)
%            Number of functors    :   31 (  31 usr;   6 con; 0-5 aty)
%            Number of variables   :  278 ( 278   !;   0   ?)

% Comments : 
%------------------------------------------------------------------------------
fof(f783,plain,
    $false,
    inference(avatar_sat_refutation,[],[f501,f608,f663,f665,f667,f715,f753,f777,f780,f782]) ).

fof(f782,plain,
    ( spl0_3
    | ~ spl0_22 ),
    inference(avatar_split_clause,[],[f781,f775,f597]) ).

fof(f597,plain,
    ( spl0_3
  <=> ! [X2] : ~ pred_attacker(X2) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_3])]) ).

fof(f775,plain,
    ( spl0_22
  <=> ! [X2] : ~ pred_attacker(tuple_client_A_in_2(X2)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_22])]) ).

fof(f781,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl0_22 ),
    inference(resolution,[],[f776,f449]) ).

fof(f449,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f334]) ).

fof(f334,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f241]) ).

fof(f241,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(rectify,[],[f141]) ).

fof(f141,axiom,
    ! [X124] :
      ( pred_attacker(X124)
     => pred_attacker(tuple_client_A_in_2(X124)) ),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax140) ).

fof(f776,plain,
    ( ! [X2] : ~ pred_attacker(tuple_client_A_in_2(X2))
    | ~ spl0_22 ),
    inference(avatar_component_clause,[],[f775]) ).

fof(f780,plain,
    ( spl0_3
    | ~ spl0_21 ),
    inference(avatar_split_clause,[],[f779,f772,f597]) ).

fof(f772,plain,
    ( spl0_21
  <=> ! [X1] : ~ pred_attacker(tuple_client_A_in_6(X1)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_21])]) ).

fof(f779,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl0_21 ),
    inference(resolution,[],[f773,f445]) ).

fof(f445,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_6(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f330]) ).

fof(f330,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_6(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f237]) ).

fof(f237,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_6(X0)) ),
    inference(rectify,[],[f137]) ).

fof(f137,axiom,
    ! [X120] :
      ( pred_attacker(X120)
     => pred_attacker(tuple_client_A_in_6(X120)) ),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax136) ).

fof(f773,plain,
    ( ! [X1] : ~ pred_attacker(tuple_client_A_in_6(X1))
    | ~ spl0_21 ),
    inference(avatar_component_clause,[],[f772]) ).

fof(f777,plain,
    ( spl0_5
    | spl0_21
    | spl0_4
    | spl0_22
    | ~ spl0_1 ),
    inference(avatar_split_clause,[],[f770,f495,f775,f600,f772,f603]) ).

fof(f603,plain,
    ( spl0_5
  <=> ! [X3] : ~ pred_attacker(tuple_client_A_in_4(X3)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_5])]) ).

fof(f600,plain,
    ( spl0_4
  <=> ! [X4] : ~ pred_attacker(tuple_client_A_in_8(X4)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_4])]) ).

fof(f495,plain,
    ( spl0_1
  <=> ! [X4,X0,X3,X2,X1] :
        ( ~ pred_attacker(tuple_client_A_in_2(X2))
        | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas))))
        | ~ pred_attacker(tuple_client_A_in_8(X4))
        | ~ pred_attacker(tuple_client_A_in_6(X1))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_4(X3))
        | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
        | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_1])]) ).

fof(f770,plain,
    ( ! [X2,X3,X1,X4] :
        ( ~ pred_attacker(tuple_client_A_in_2(X2))
        | ~ pred_attacker(tuple_client_A_in_8(X4))
        | ~ pred_attacker(tuple_client_A_in_6(X1))
        | ~ pred_attacker(tuple_client_A_in_4(X3)) )
    | ~ spl0_1 ),
    inference(subsumption_resolution,[],[f769,f420]) ).

fof(f420,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(cnf_transformation,[],[f213]) ).

fof(f213,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(rectify,[],[f96]) ).

fof(f96,axiom,
    ! [X62,X63] : pred_eq_bitstring_bitstring(X62,X63),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax95) ).

fof(f769,plain,
    ( ! [X2,X3,X0,X1,X4] :
        ( ~ pred_attacker(tuple_client_A_in_2(X2))
        | ~ pred_attacker(tuple_client_A_in_8(X4))
        | ~ pred_attacker(tuple_client_A_in_6(X1))
        | ~ pred_attacker(tuple_client_A_in_4(X3))
        | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas))) )
    | ~ spl0_1 ),
    inference(subsumption_resolution,[],[f768,f420]) ).

fof(f768,plain,
    ( ! [X2,X3,X0,X1,X4] :
        ( ~ pred_attacker(tuple_client_A_in_2(X2))
        | ~ pred_attacker(tuple_client_A_in_8(X4))
        | ~ pred_attacker(tuple_client_A_in_6(X1))
        | ~ pred_attacker(tuple_client_A_in_4(X3))
        | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
        | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas))) )
    | ~ spl0_1 ),
    inference(subsumption_resolution,[],[f767,f420]) ).

fof(f767,plain,
    ( ! [X2,X3,X0,X1,X4] :
        ( ~ pred_attacker(tuple_client_A_in_2(X2))
        | ~ pred_attacker(tuple_client_A_in_8(X4))
        | ~ pred_attacker(tuple_client_A_in_6(X1))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_4(X3))
        | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
        | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas))) )
    | ~ spl0_1 ),
    inference(subsumption_resolution,[],[f496,f420]) ).

fof(f496,plain,
    ( ! [X2,X3,X0,X1,X4] :
        ( ~ pred_attacker(tuple_client_A_in_2(X2))
        | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas))))
        | ~ pred_attacker(tuple_client_A_in_8(X4))
        | ~ pred_attacker(tuple_client_A_in_6(X1))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_4(X3))
        | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
        | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas))) )
    | ~ spl0_1 ),
    inference(avatar_component_clause,[],[f495]) ).

fof(f753,plain,
    ( spl0_3
    | spl0_3
    | ~ spl0_2
    | ~ spl0_6
    | ~ spl0_13 ),
    inference(avatar_split_clause,[],[f752,f713,f606,f498,f597,f597]) ).

fof(f498,plain,
    ( spl0_2
  <=> pred_attacker(tuple_client_A_out_9(name_objective1)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_2])]) ).

fof(f606,plain,
    ( spl0_6
  <=> ! [X0] :
        ( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
        | ~ pred_attacker(tuple_client_A_in_6(X0)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_6])]) ).

fof(f713,plain,
    ( spl0_13
  <=> ! [X2,X0] :
        ( ~ pred_attacker(X0)
        | ~ pred_attacker(X2)
        | pred_attacker(constr_cbc_enc_2(X2,X0,name_Kas)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_13])]) ).

fof(f752,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(X0)
        | ~ pred_attacker(X1) )
    | ~ spl0_2
    | ~ spl0_6
    | ~ spl0_13 ),
    inference(duplicate_literal_removal,[],[f749]) ).

fof(f749,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(X0)
        | ~ pred_attacker(X1)
        | ~ pred_attacker(X0) )
    | ~ spl0_2
    | ~ spl0_6
    | ~ spl0_13 ),
    inference(resolution,[],[f714,f722]) ).

fof(f722,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(constr_cbc_enc_2(X0,X1,name_Kas))
        | ~ pred_attacker(X0) )
    | ~ spl0_2
    | ~ spl0_6 ),
    inference(forward_demodulation,[],[f721,f396]) ).

fof(f396,plain,
    ! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
    inference(cnf_transformation,[],[f197]) ).

fof(f197,plain,
    ! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
    inference(rectify,[],[f92]) ).

fof(f92,axiom,
    ! [X50,X51] : constr_tuple_2_get_0x30_bitstring(tuple_2(X50,X51)) = X50,
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax91) ).

fof(f721,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)))
        | ~ pred_attacker(constr_cbc_enc_2(X0,X1,name_Kas)) )
    | ~ spl0_2
    | ~ spl0_6 ),
    inference(superposition,[],[f689,f397]) ).

fof(f397,plain,
    ! [X2,X0,X1] : constr_cbc_dec_2(constr_cbc_enc_2(X1,X2,X0),X0) = tuple_2(X1,X2),
    inference(cnf_transformation,[],[f198]) ).

fof(f198,plain,
    ! [X0,X1,X2] : constr_cbc_dec_2(constr_cbc_enc_2(X1,X2,X0),X0) = tuple_2(X1,X2),
    inference(rectify,[],[f81]) ).

fof(f81,axiom,
    ! [X9,X10,X11] : constr_cbc_dec_2(constr_cbc_enc_2(X10,X11,X9),X9) = tuple_2(X10,X11),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax80) ).

fof(f689,plain,
    ( ! [X0] :
        ( ~ pred_attacker(constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))
        | ~ pred_attacker(X0) )
    | ~ spl0_2
    | ~ spl0_6 ),
    inference(subsumption_resolution,[],[f687,f524]) ).

fof(f524,plain,
    ( ~ pred_attacker(name_objective2)
    | ~ spl0_2 ),
    inference(subsumption_resolution,[],[f521,f510]) ).

fof(f510,plain,
    ( pred_attacker(name_objective1)
    | ~ spl0_2 ),
    inference(resolution,[],[f451,f500]) ).

fof(f500,plain,
    ( pred_attacker(tuple_client_A_out_9(name_objective1))
    | ~ spl0_2 ),
    inference(avatar_component_clause,[],[f498]) ).

fof(f451,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_A_out_9(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f335]) ).

fof(f335,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_9(X0)) ),
    inference(ennf_transformation,[],[f243]) ).

fof(f243,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_out_9(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f122]) ).

fof(f122,axiom,
    ! [X97] :
      ( pred_attacker(tuple_client_A_out_9(X97))
     => pred_attacker(X97) ),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax121) ).

fof(f521,plain,
    ( ~ pred_attacker(name_objective2)
    | ~ pred_attacker(name_objective1) ),
    inference(resolution,[],[f394,f382]) ).

fof(f382,plain,
    ~ pred_attacker(tuple_2(name_objective1,name_objective2)),
    inference(cnf_transformation,[],[f192]) ).

fof(f192,plain,
    ~ pred_attacker(tuple_2(name_objective1,name_objective2)),
    inference(flattening,[],[f191]) ).

fof(f191,negated_conjecture,
    ~ pred_attacker(tuple_2(name_objective1,name_objective2)),
    inference(negated_conjecture,[],[f190]) ).

fof(f190,conjecture,
    pred_attacker(tuple_2(name_objective1,name_objective2)),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',co0) ).

fof(f394,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f289]) ).

fof(f289,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f288]) ).

fof(f288,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f195]) ).

fof(f195,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_2(X0,X1)) ),
    inference(rectify,[],[f171]) ).

fof(f171,axiom,
    ! [X186,X187] :
      ( ( pred_attacker(X187)
        & pred_attacker(X186) )
     => pred_attacker(tuple_2(X186,X187)) ),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax170) ).

fof(f687,plain,
    ( ! [X0] :
        ( ~ pred_attacker(X0)
        | ~ pred_attacker(constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))
        | pred_attacker(name_objective2) )
    | ~ spl0_6 ),
    inference(resolution,[],[f683,f530]) ).

fof(f530,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(constr_enc(X0,X1))
      | ~ pred_attacker(X1)
      | pred_attacker(X0) ),
    inference(superposition,[],[f483,f433]) ).

fof(f433,plain,
    ! [X0,X1] : constr_dec(constr_enc(X1,X0),X0) = X1,
    inference(cnf_transformation,[],[f225]) ).

fof(f225,plain,
    ! [X0,X1] : constr_dec(constr_enc(X1,X0),X0) = X1,
    inference(rectify,[],[f89]) ).

fof(f89,axiom,
    ! [X40,X41] : constr_dec(constr_enc(X41,X40),X40) = X41,
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax88) ).

fof(f483,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_dec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f368]) ).

fof(f368,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_dec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f367]) ).

fof(f367,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_dec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f275]) ).

fof(f275,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(constr_dec(X0,X1)) ),
    inference(rectify,[],[f114]) ).

fof(f114,axiom,
    ! [X88,X89] :
      ( ( pred_attacker(X89)
        & pred_attacker(X88) )
     => pred_attacker(constr_dec(X88,X89)) ),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax113) ).

fof(f683,plain,
    ( ! [X0] :
        ( pred_attacker(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))
        | ~ pred_attacker(X0) )
    | ~ spl0_6 ),
    inference(resolution,[],[f668,f440]) ).

fof(f440,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_A_out_10(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f325]) ).

fof(f325,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_10(X0)) ),
    inference(ennf_transformation,[],[f232]) ).

fof(f232,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_out_10(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f130]) ).

fof(f130,axiom,
    ! [X105] :
      ( pred_attacker(tuple_client_A_out_10(X105))
     => pred_attacker(X105) ),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax129) ).

fof(f668,plain,
    ( ! [X0] :
        ( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
        | ~ pred_attacker(X0) )
    | ~ spl0_6 ),
    inference(resolution,[],[f607,f445]) ).

fof(f607,plain,
    ( ! [X0] :
        ( ~ pred_attacker(tuple_client_A_in_6(X0))
        | pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))) )
    | ~ spl0_6 ),
    inference(avatar_component_clause,[],[f606]) ).

fof(f714,plain,
    ( ! [X2,X0] :
        ( pred_attacker(constr_cbc_enc_2(X2,X0,name_Kas))
        | ~ pred_attacker(X2)
        | ~ pred_attacker(X0) )
    | ~ spl0_13 ),
    inference(avatar_component_clause,[],[f713]) ).

fof(f715,plain,
    ( spl0_3
    | spl0_13 ),
    inference(avatar_split_clause,[],[f694,f713,f597]) ).

fof(f694,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(X0)
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X2)
      | pred_attacker(constr_cbc_enc_2(X2,X0,name_Kas)) ),
    inference(resolution,[],[f679,f552]) ).

fof(f552,plain,
    ! [X2,X3,X0,X1,X4] :
      ( ~ pred_attacker(constr_cbc_enc_4(X0,X1,X2,X3,X4))
      | pred_attacker(constr_cbc_enc_2(X0,X1,X4)) ),
    inference(superposition,[],[f467,f416]) ).

fof(f416,plain,
    ! [X2,X3,X0,X1,X4] : constr_cbc_enc_2(X1,X2,X0) = constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X1,X2,X3,X4,X0)),
    inference(cnf_transformation,[],[f209]) ).

fof(f209,plain,
    ! [X0,X1,X2,X3,X4] : constr_cbc_enc_2(X1,X2,X0) = constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X1,X2,X3,X4,X0)),
    inference(rectify,[],[f84]) ).

fof(f84,axiom,
    ! [X19,X20,X21,X22,X23] : constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X20,X21,X22,X23,X19)) = constr_cbc_enc_2(X20,X21,X19),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax83) ).

fof(f467,plain,
    ! [X0] :
      ( pred_attacker(constr_cbc_4_get_2_prefixes(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f352]) ).

fof(f352,plain,
    ! [X0] :
      ( pred_attacker(constr_cbc_4_get_2_prefixes(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f259]) ).

fof(f259,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(constr_cbc_4_get_2_prefixes(X0)) ),
    inference(rectify,[],[f152]) ).

fof(f152,axiom,
    ! [X149] :
      ( pred_attacker(X149)
     => pred_attacker(constr_cbc_4_get_2_prefixes(X149)) ),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax151) ).

fof(f679,plain,
    ! [X2,X3,X0,X1] :
      ( pred_attacker(constr_cbc_enc_4(X0,X1,name_Kab_66(X3),constr_cbc_enc_2(name_Kab_66(X3),X2,name_Kbs),name_Kas))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X2)
      | ~ pred_attacker(X0) ),
    inference(resolution,[],[f571,f457]) ).

fof(f457,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_server_S_out_2(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f341]) ).

fof(f341,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_server_S_out_2(X0)) ),
    inference(ennf_transformation,[],[f249]) ).

fof(f249,plain,
    ! [X0] :
      ( pred_attacker(tuple_server_S_out_2(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f107]) ).

fof(f107,axiom,
    ! [X73] :
      ( pred_attacker(tuple_server_S_out_2(X73))
     => pred_attacker(X73) ),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax106) ).

fof(f571,plain,
    ! [X2,X3,X0,X1] :
      ( pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X0,X1,name_Kab_66(X2),constr_cbc_enc_2(name_Kab_66(X2),X3,name_Kbs),name_Kas)))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X3) ),
    inference(resolution,[],[f412,f462]) ).

fof(f462,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_server_S_in_1(X0,X1,X2))
      | ~ pred_attacker(X2)
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f347]) ).

fof(f347,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_server_S_in_1(X0,X1,X2))
      | ~ pred_attacker(X2)
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f346]) ).

fof(f346,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_server_S_in_1(X0,X1,X2))
      | ~ pred_attacker(X2)
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f254]) ).

fof(f254,plain,
    ! [X0,X1,X2] :
      ( ( pred_attacker(X2)
        & pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_server_S_in_1(X0,X1,X2)) ),
    inference(rectify,[],[f108]) ).

fof(f108,axiom,
    ! [X74,X75,X76] :
      ( ( pred_attacker(X76)
        & pred_attacker(X75)
        & pred_attacker(X74) )
     => pred_attacker(tuple_server_S_in_1(X74,X75,X76)) ),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax107) ).

fof(f412,plain,
    ! [X2,X3,X0,X1] :
      ( ~ pred_attacker(tuple_server_S_in_1(X1,X2,X3))
      | pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X3,X2,name_Kab_66(X0),constr_cbc_enc_2(name_Kab_66(X0),X1,name_Kbs),name_Kas))) ),
    inference(cnf_transformation,[],[f300]) ).

fof(f300,plain,
    ! [X0,X1,X2,X3] :
      ( pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X3,X2,name_Kab_66(X0),constr_cbc_enc_2(name_Kab_66(X0),X1,name_Kbs),name_Kas)))
      | ~ pred_attacker(tuple_server_S_in_1(X1,X2,X3)) ),
    inference(ennf_transformation,[],[f205]) ).

fof(f205,plain,
    ! [X0,X1,X2,X3] :
      ( pred_attacker(tuple_server_S_in_1(X1,X2,X3))
     => pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X3,X2,name_Kab_66(X0),constr_cbc_enc_2(name_Kab_66(X0),X1,name_Kbs),name_Kas))) ),
    inference(rectify,[],[f189]) ).

fof(f189,axiom,
    ! [X220,X221,X222,X223] :
      ( pred_attacker(tuple_server_S_in_1(X221,X222,X223))
     => pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X223,X222,name_Kab_66(X220),constr_cbc_enc_2(name_Kab_66(X220),X221,name_Kbs),name_Kas))) ),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax188) ).

fof(f667,plain,
    ( spl0_3
    | ~ spl0_5 ),
    inference(avatar_split_clause,[],[f666,f603,f597]) ).

fof(f666,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl0_5 ),
    inference(resolution,[],[f604,f447]) ).

fof(f447,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f332]) ).

fof(f332,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f239]) ).

fof(f239,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(rectify,[],[f139]) ).

fof(f139,axiom,
    ! [X122] :
      ( pred_attacker(X122)
     => pred_attacker(tuple_client_A_in_4(X122)) ),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax138) ).

fof(f604,plain,
    ( ! [X3] : ~ pred_attacker(tuple_client_A_in_4(X3))
    | ~ spl0_5 ),
    inference(avatar_component_clause,[],[f603]) ).

fof(f665,plain,
    ( spl0_3
    | ~ spl0_4 ),
    inference(avatar_split_clause,[],[f664,f600,f597]) ).

fof(f664,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl0_4 ),
    inference(resolution,[],[f601,f443]) ).

fof(f443,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_8(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f328]) ).

fof(f328,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_8(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f235]) ).

fof(f235,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_8(X0)) ),
    inference(rectify,[],[f135]) ).

fof(f135,axiom,
    ! [X118] :
      ( pred_attacker(X118)
     => pred_attacker(tuple_client_A_in_8(X118)) ),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax134) ).

fof(f601,plain,
    ( ! [X4] : ~ pred_attacker(tuple_client_A_in_8(X4))
    | ~ spl0_4 ),
    inference(avatar_component_clause,[],[f600]) ).

fof(f663,plain,
    ~ spl0_3,
    inference(avatar_contradiction_clause,[],[f609]) ).

fof(f609,plain,
    ( $false
    | ~ spl0_3 ),
    inference(resolution,[],[f598,f404]) ).

fof(f404,plain,
    pred_attacker(name_A),
    inference(cnf_transformation,[],[f179]) ).

fof(f179,axiom,
    pred_attacker(name_A),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax178) ).

fof(f598,plain,
    ( ! [X2] : ~ pred_attacker(X2)
    | ~ spl0_3 ),
    inference(avatar_component_clause,[],[f597]) ).

fof(f608,plain,
    ( spl0_3
    | spl0_4
    | spl0_5
    | spl0_6 ),
    inference(avatar_split_clause,[],[f595,f606,f603,f600,f597]) ).

fof(f595,plain,
    ! [X2,X3,X0,X4] :
      ( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X0))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_attacker(X2) ),
    inference(subsumption_resolution,[],[f594,f420]) ).

fof(f594,plain,
    ! [X2,X3,X0,X1,X4] :
      ( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X0))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X1)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))
      | ~ pred_attacker(X2) ),
    inference(subsumption_resolution,[],[f593,f420]) ).

fof(f593,plain,
    ! [X2,X3,X0,X1,X4] :
      ( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X0))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X0,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X1)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))
      | ~ pred_attacker(X2) ),
    inference(subsumption_resolution,[],[f592,f420]) ).

fof(f592,plain,
    ! [X2,X3,X0,X1,X4] :
      ( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X0))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X0,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X1)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))
      | ~ pred_attacker(X2) ),
    inference(subsumption_resolution,[],[f591,f420]) ).

fof(f591,plain,
    ! [X2,X3,X0,X1,X4] :
      ( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
      | ~ pred_eq_bitstring_bitstring(name_Na(X1),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X0))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X0,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X1)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))
      | ~ pred_attacker(X2) ),
    inference(resolution,[],[f407,f449]) ).

fof(f407,plain,
    ! [X2,X3,X0,X1,X4] :
      ( ~ pred_attacker(tuple_client_A_in_2(X2))
      | pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(cnf_transformation,[],[f293]) ).

fof(f293,plain,
    ! [X0,X1,X2,X3,X4] :
      ( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(flattening,[],[f292]) ).

fof(f292,plain,
    ! [X0,X1,X2,X3,X4] :
      ( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(ennf_transformation,[],[f200]) ).

fof(f200,plain,
    ! [X0,X1,X2,X3,X4] :
      ( ( pred_attacker(tuple_client_A_in_2(X2))
        & pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
        & pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
        & pred_attacker(tuple_client_A_in_4(X3))
        & pred_attacker(tuple_client_A_in_6(X1))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
        & pred_attacker(tuple_client_A_in_8(X4))
        & pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) )
     => pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas))))) ),
    inference(rectify,[],[f187]) ).

fof(f187,axiom,
    ! [X213,X214,X215,X216,X217] :
      ( ( pred_attacker(tuple_client_A_in_2(X215))
        & pred_eq_bitstring_bitstring(name_Na(X213),constr_tuple_4_get_0x30(constr_cbc_dec_4(X215,name_Kas)))
        & pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X215,name_Kas)))
        & pred_attacker(tuple_client_A_in_4(X216))
        & pred_attacker(tuple_client_A_in_6(X214))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X214,name_Kas)))
        & pred_attacker(tuple_client_A_in_8(X217))
        & pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X216,X215,X213)),constr_cbc_dec_1(X217,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X214,name_Kas)))) )
     => pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X214,name_Kas))))) ),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax186) ).

fof(f501,plain,
    ( spl0_1
    | spl0_2 ),
    inference(avatar_split_clause,[],[f408,f498,f495]) ).

fof(f408,plain,
    ! [X2,X3,X0,X1,X4] :
      ( pred_attacker(tuple_client_A_out_9(name_objective1))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(cnf_transformation,[],[f295]) ).

fof(f295,plain,
    ! [X0,X1,X2,X3,X4] :
      ( pred_attacker(tuple_client_A_out_9(name_objective1))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(flattening,[],[f294]) ).

fof(f294,plain,
    ! [X0,X1,X2,X3,X4] :
      ( pred_attacker(tuple_client_A_out_9(name_objective1))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_attacker(tuple_client_A_in_6(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
    inference(ennf_transformation,[],[f201]) ).

fof(f201,plain,
    ! [X0,X1,X2,X3,X4] :
      ( ( pred_attacker(tuple_client_A_in_2(X2))
        & pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
        & pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
        & pred_attacker(tuple_client_A_in_4(X3))
        & pred_attacker(tuple_client_A_in_6(X1))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
        & pred_attacker(tuple_client_A_in_8(X4))
        & pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) )
     => pred_attacker(tuple_client_A_out_9(name_objective1)) ),
    inference(rectify,[],[f186]) ).

fof(f186,axiom,
    ! [X208,X209,X210,X211,X212] :
      ( ( pred_attacker(tuple_client_A_in_2(X210))
        & pred_eq_bitstring_bitstring(name_Na(X208),constr_tuple_4_get_0x30(constr_cbc_dec_4(X210,name_Kas)))
        & pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X210,name_Kas)))
        & pred_attacker(tuple_client_A_in_4(X211))
        & pred_attacker(tuple_client_A_in_6(X209))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X209,name_Kas)))
        & pred_attacker(tuple_client_A_in_8(X212))
        & pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X211,X210,X208)),constr_cbc_dec_1(X212,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X209,name_Kas)))) )
     => pred_attacker(tuple_client_A_out_9(name_objective1)) ),
    file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax185) ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.09/0.11  % Problem    : SWW968+1 : TPTP v8.1.2. Released v7.4.0.
% 0.09/0.12  % Command    : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t %d %s
% 0.11/0.32  % Computer : n004.cluster.edu
% 0.11/0.32  % Model    : x86_64 x86_64
% 0.11/0.32  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.11/0.32  % Memory   : 8042.1875MB
% 0.11/0.32  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.11/0.33  % CPULimit   : 300
% 0.11/0.33  % WCLimit    : 300
% 0.11/0.33  % DateTime   : Tue Apr 30 17:54:18 EDT 2024
% 0.11/0.33  % CPUTime    : 
% 0.11/0.33  This is a FOF_THM_RFO_SEQ problem
% 0.11/0.33  Running vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t 300 /export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628
% 0.61/0.81  % (11746)ott+1011_1:1_sil=2000:urr=on:i=33:sd=1:kws=inv_frequency:ss=axioms:sup=off_0 on Vampire---4 for (2995ds/33Mi)
% 0.61/0.81  % (11744)lrs+1011_461:32768_sil=16000:irw=on:sp=frequency:lsd=20:fd=preordered:nwc=10.0:s2agt=32:alpa=false:cond=fast:s2a=on:i=51:s2at=3.0:awrs=decay:awrsf=691:bd=off:nm=20:fsr=off:amm=sco:uhcvi=on:rawr=on_0 on Vampire---4 for (2995ds/51Mi)
% 0.61/0.81  % (11745)lrs+1011_1:1_sil=8000:sp=occurrence:nwc=10.0:i=78:ss=axioms:sgt=8_0 on Vampire---4 for (2995ds/78Mi)
% 0.61/0.81  % (11747)lrs+2_1:1_sil=16000:fde=none:sos=all:nwc=5.0:i=34:ep=RS:s2pl=on:lma=on:afp=100000_0 on Vampire---4 for (2995ds/34Mi)
% 0.61/0.81  % (11743)dis-1011_2:1_sil=2000:lsd=20:nwc=5.0:flr=on:mep=off:st=3.0:i=34:sd=1:ep=RS:ss=axioms_0 on Vampire---4 for (2995ds/34Mi)
% 0.61/0.81  % (11748)lrs+1002_1:16_to=lpo:sil=32000:sp=unary_frequency:sos=on:i=45:bd=off:ss=axioms_0 on Vampire---4 for (2995ds/45Mi)
% 0.61/0.81  % (11749)lrs+21_1:5_sil=2000:sos=on:urr=on:newcnf=on:slsq=on:i=83:slsql=off:bd=off:nm=2:ss=axioms:st=1.5:sp=const_min:gsp=on:rawr=on_0 on Vampire---4 for (2995ds/83Mi)
% 0.61/0.81  % (11750)lrs-21_1:1_to=lpo:sil=2000:sp=frequency:sos=on:lma=on:i=56:sd=2:ss=axioms:ep=R_0 on Vampire---4 for (2995ds/56Mi)
% 0.61/0.81  % (11750)Refutation not found, incomplete strategy% (11750)------------------------------
% 0.61/0.81  % (11750)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.61/0.81  % (11748)Refutation not found, incomplete strategy% (11748)------------------------------
% 0.61/0.81  % (11748)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.61/0.81  % (11748)Termination reason: Refutation not found, incomplete strategy
% 0.61/0.81  
% 0.61/0.81  % (11748)Memory used [KB]: 1153
% 0.61/0.81  % (11748)Time elapsed: 0.003 s
% 0.61/0.81  % (11748)Instructions burned: 3 (million)
% 0.61/0.81  % (11748)------------------------------
% 0.61/0.81  % (11748)------------------------------
% 0.61/0.81  % (11750)Termination reason: Refutation not found, incomplete strategy
% 0.61/0.81  
% 0.61/0.81  % (11750)Memory used [KB]: 1155
% 0.61/0.81  % (11750)Time elapsed: 0.003 s
% 0.61/0.81  % (11750)Instructions burned: 3 (million)
% 0.61/0.81  % (11750)------------------------------
% 0.61/0.81  % (11750)------------------------------
% 0.61/0.81  % (11743)Refutation not found, incomplete strategy% (11743)------------------------------
% 0.61/0.81  % (11743)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.61/0.81  % (11743)Termination reason: Refutation not found, incomplete strategy
% 0.61/0.81  
% 0.61/0.81  % (11743)Memory used [KB]: 1160
% 0.61/0.81  % (11743)Time elapsed: 0.004 s
% 0.61/0.81  % (11743)Instructions burned: 4 (million)
% 0.61/0.81  % (11743)------------------------------
% 0.61/0.81  % (11743)------------------------------
% 0.61/0.81  % (11747)Refutation not found, incomplete strategy% (11747)------------------------------
% 0.61/0.81  % (11747)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.61/0.81  % (11747)Termination reason: Refutation not found, incomplete strategy
% 0.61/0.81  
% 0.61/0.81  % (11747)Memory used [KB]: 1268
% 0.61/0.81  % (11747)Time elapsed: 0.006 s
% 0.61/0.81  % (11747)Instructions burned: 8 (million)
% 0.61/0.81  % (11747)------------------------------
% 0.61/0.81  % (11747)------------------------------
% 0.61/0.81  % (11751)lrs+21_1:16_sil=2000:sp=occurrence:urr=on:flr=on:i=55:sd=1:nm=0:ins=3:ss=included:rawr=on:br=off_0 on Vampire---4 for (2995ds/55Mi)
% 0.61/0.81  % (11752)dis+3_25:4_sil=16000:sos=all:erd=off:i=50:s2at=4.0:bd=off:nm=60:sup=off:cond=on:av=off:ins=2:nwc=10.0:etr=on:to=lpo:s2agt=20:fd=off:bsr=unit_only:slsq=on:slsqr=28,19:awrs=converge:awrsf=500:tgt=ground:bs=unit_only_0 on Vampire---4 for (2995ds/50Mi)
% 0.61/0.81  % (11753)lrs+1010_1:2_sil=4000:tgt=ground:nwc=10.0:st=2.0:i=208:sd=1:bd=off:ss=axioms_0 on Vampire---4 for (2995ds/208Mi)
% 0.61/0.82  % (11754)lrs-1011_1:1_sil=4000:plsq=on:plsqr=32,1:sp=frequency:plsql=on:nwc=10.0:i=52:aac=none:afr=on:ss=axioms:er=filter:sgt=16:rawr=on:etr=on:lma=on_0 on Vampire---4 for (2995ds/52Mi)
% 0.61/0.82  % (11753)Refutation not found, incomplete strategy% (11753)------------------------------
% 0.61/0.82  % (11753)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.61/0.82  % (11753)Termination reason: Refutation not found, incomplete strategy
% 0.61/0.82  
% 0.61/0.82  % (11753)Memory used [KB]: 1158
% 0.61/0.82  % (11753)Time elapsed: 0.003 s
% 0.61/0.82  % (11753)Instructions burned: 4 (million)
% 0.61/0.82  % (11753)------------------------------
% 0.61/0.82  % (11753)------------------------------
% 0.61/0.82  % (11755)lrs-1010_1:1_to=lpo:sil=2000:sp=reverse_arity:sos=on:urr=ec_only:i=518:sd=2:bd=off:ss=axioms:sgt=16_0 on Vampire---4 for (2995ds/518Mi)
% 0.61/0.82  % (11745)First to succeed.
% 0.61/0.82  % (11755)Refutation not found, incomplete strategy% (11755)------------------------------
% 0.61/0.82  % (11755)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.61/0.82  % (11745)Refutation found. Thanks to Tanya!
% 0.61/0.82  % SZS status Theorem for Vampire---4
% 0.61/0.82  % SZS output start Proof for Vampire---4
% See solution above
% 0.61/0.83  % (11745)------------------------------
% 0.61/0.83  % (11745)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.61/0.83  % (11745)Termination reason: Refutation
% 0.61/0.83  
% 0.61/0.83  % (11745)Memory used [KB]: 1334
% 0.61/0.83  % (11745)Time elapsed: 0.016 s
% 0.61/0.83  % (11745)Instructions burned: 26 (million)
% 0.61/0.83  % (11745)------------------------------
% 0.61/0.83  % (11745)------------------------------
% 0.61/0.83  % (11738)Success in time 0.489 s
% 0.61/0.83  % Vampire---4.8 exiting
%------------------------------------------------------------------------------