Convert SEE ALSO to use Rs/Re.

This commit is contained in:
wiz 2004-06-04 10:25:22 +00:00
parent 726e232131
commit c7cdc4e68b

View File

@ -1,4 +1,4 @@
.\" $NetBSD: bdes.1,v 1.11 2003/08/07 11:13:11 agc Exp $
.\" $NetBSD: bdes.1,v 1.12 2004/06/04 10:25:22 wiz Exp $
.\"
.\" Copyright (c) 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -247,59 +247,74 @@ does too, but this may be changed from the command line.
.Sh SEE ALSO
.Xr crypt 3 ,
.Xr getpass 3
.Pp
.Em "Data Encryption Standard" ,
Federal Information Processing Standard #46,
National Bureau of Standards,
U.S. Department of Commerce,
Washington DC
(Jan. 1977).
.Pp
.Em "DES Modes of Operation" ,
Federal Information Processing Standard #81,
National Bureau of Standards,
U.S. Department of Commerce
Washington DC
(Dec. 1980).
.Pp
Dorothy Denning,
.Em "Cryptography and Data Security" ,
Addison-Wesley Publishing Co.,
Reading, MA
\(co1982.
.Pp
Matt Bishop,
.Em "Implementation Notes on bdes(1)" ,
Technical Report PCS-TR-91-158,
Department of Mathematics and Computer Science,
Dartmouth College,
Hanover, NH 03755
(Apr. 1991).
.Pp
M.J. Wiener,
.Em "Efficient DES Key Search" ,
Technical Report 244,
School of Computer Science,
Carleton University
(May 1994).
.Pp
Bruce Schneier,
.Em "Applied Cryptography (2nd edition)" ,
John Wiley \*[Am] Sons, Inc.,
New York, NY
\(co1996.
.Pp
M. Matsui,
.Em "Linear Cryptanalysis Method for DES Cipher" ,
Advances in Cryptology -- Eurocrypt '93 Proceedings,
Springer-Verlag
\(co1994.
.Pp
Blaze, Diffie, Rivest, Schneier, Shimomura, Thompson, and Wiener,
.Em "Minimal Key Lengths for Symmetric Ciphers To Provide Adequate Commercial Security" ,
Business Software Alliance,
http://www.bsa.org/policy/encryption/cryptographers.html
(January 1996).
.Rs
.%T Data Encryption Standard
.%R Federal Information Processing Standard #46
.%Q National Bureau of Standards, U.S. Department of Commerce
.\" should be .%C as soon as it's supported.
.%O Washington DC
.%D January 1977
.Re
.Rs
.%T DES Modes of Operation
.%R Federal Information Processing Standard #81
.%Q National Bureau of Standards, U.S. Department of Commerce
.\" should be .%C as soon as it's supported.
.%O Washington DC
.%D December 1980
.Re
.Rs
.%A Dorothy Denning
.%T Cryptography and Data Security
.%I Addison-Wesley Publishing Co.
.\" should be .%C as soon as it's supported.
.%O Reading, MA
.%D 1982
.Re
.Rs
.%A Matt Bishop
.%T Implementation Notes on bdes(1)
.%R Technical Report PCS-TR-91-158
.%Q Department of Mathematics and Computer Science, Dartmouth College
.\" should be .%C as soon as it's supported.
.%O Hanover, NH 03755
.%D April 1991
.Re
.Rs
.%A M.J. Wiener
.%T Efficient DES Key Search
.%R Technical Report 244
.%Q School of Computer Science, Carleton University
.%D May 1994
.Re
.Rs
.%A Bruce Schneier
.%T Applied Cryptography (2nd edition)
.%I John Wiley \*[Am] Sons, Inc.
.%O New York, NY
.\" should be .%C as soon as it's supported.
.%D 1996
.Re
.Rs
.%A M. Matsui
.%T Linear Cryptanalysis Method for DES Cipher
.%R Advances in Cryptology -- Eurocrypt '93 Proceedings
.%I Springer-Verlag
.%D 1994
.Re
.Rs
.%A Blaze
.%A Diffie
.%A Rivest
.%A Schneier
.%A Shimomura
.%A Thompson
.%A Wiener
.%T Minimal Key Lengths for Symmetric Ciphers To Provide Adequate Commercial Security
.%I Business Software Alliance
.%O http://www.bsa.org/policy/encryption/cryptographers.html
.%D January 1996
.Re
.Sh DISCLAIMER
.Bd -literal
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND