The cipher-aes package
Fast AES cipher implementation with advanced mode of operations.
The modes of operations available are ECB (Electronic code book), CBC (Cipher block chaining), CTR (Counter), XTS (XEX with ciphertext stealing), GCM (Galois Counter Mode).
The AES implementation uses AES-NI when available (on x86 and x86-64 architecture), but fallback gracefully to a software C implementation.
The software implementation uses S-Boxes, which might suffer for cache timing issues. However do notes that most other known software implementations, including very popular one (openssl, gnutls) also uses similar implementation. If it matters for your case, you should make sure you have AES-NI available, or you'll need to use a different implementation.
|Versions||0.1.0, 0.1.1, 0.1.2, 0.1.3, 0.1.4, 0.1.5, 0.1.6, 0.1.7, 0.1.8, 0.2.0, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 0.2.5, 0.2.6, 0.2.7, 0.2.8, 0.2.9, 0.2.10, 0.2.11|
|Dependencies||base (==4.*), byteable, bytestring, crypto-cipher-types (<0.0.3), securemem (>=0.1.2) [details]|
|Copyright||Vincent Hanquez <email@example.com>|
|Author||Vincent Hanquez <firstname.lastname@example.org>|
|Maintainer||Vincent Hanquez <email@example.com>|
|Source repository||head: git clone git://github.com/vincenthz/hs-cipher-aes|
|Uploaded||Tue Aug 13 05:04:36 UTC 2013 by VincentHanquez|
|Updated||Fri Jan 16 15:29:25 UTC 2015 by HerbertValerioRiedel to revision 1 [What is this?]|
|Distributions||Arch:0.2.11, Debian:0.2.11, FreeBSD:0.2.11, LTSHaskell:0.2.11, NixOS:0.2.11, Stackage:0.2.11, Tumbleweed:0.2.11|
|Downloads||109511 total (839 in the last 30 days)|
|Rating||(no votes yet) [estimated by rule of succession]|
|Status||Docs uploaded by user
Build status unknown [no reports yet]
Hackage Matrix CI
- cipher-aes-0.2.1.tar.gz [browse] (Cabal source package)
- Package description (revised from the package)
Note: This package has metadata revisions in the cabal description newer than included in the tarball. To unpack the package including the revisions, use 'cabal get'.
For package maintainers and hackage trustees