cipher-aes: Fast AES cipher implementation with advanced mode of operations

[ benchmark, bsd3, cryptography, deprecated, library ] [ Propose Tags ]
Deprecated. in favor of cryptonite
Versions 0.1.0, 0.1.1, 0.1.2, 0.1.3, 0.1.4, 0.1.5, 0.1.6, 0.1.7, 0.1.8, 0.2.0, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 0.2.5, 0.2.6, 0.2.7, 0.2.8, 0.2.9, 0.2.10, 0.2.11
Dependencies base (==4.*), byteable, bytestring, crypto‑cipher‑types (>=0.0.3), securemem (>=0.1.2) [details]
License BSD-3-Clause
Copyright Vincent Hanquez <>
Author Vincent Hanquez <>
Maintainer Vincent Hanquez <>
Category Cryptography
Home page
Source repo head: git clone git://
Uploaded by VincentHanquez at Wed Sep 4 07:26:23 UTC 2013
Distributions Arch:0.2.11, Debian:0.2.11, Fedora:0.2.11, FreeBSD:0.2.11, LTSHaskell:0.2.11, NixOS:0.2.11, Stackage:0.2.11, openSUSE:0.2.11
Downloads 112691 total (207 in the last 30 days)
Rating (no votes yet) [estimated by rule of succession]
Your Rating
  • λ
  • λ
  • λ
Status Docs uploaded by user
Build status unknown [no reports yet]
Hackage Matrix CI

Fast AES cipher implementation with advanced mode of operations.

The modes of operations available are ECB (Electronic code book), CBC (Cipher block chaining), CTR (Counter), XTS (XEX with ciphertext stealing), GCM (Galois Counter Mode).

The AES implementation uses AES-NI when available (on x86 and x86-64 architecture), but fallback gracefully to a software C implementation.

The software implementation uses S-Boxes, which might suffer for cache timing issues. However do notes that most other known software implementations, including very popular one (openssl, gnutls) also uses similar implementation. If it matters for your case, you should make sure you have AES-NI available, or you'll need to use a different implementation.




Maintainer's Corner

For package maintainers and hackage trustees