• Home
  • Contact
  • Blog
  • Techie Tabby
  • QRAMM
  • Resources
    • Cryptography
    • Homomorphic Encryption
    • Quantum Computing
  • More
    • Home
    • Contact
    • Blog
    • Techie Tabby
    • QRAMM
    • Resources
      • Cryptography
      • Homomorphic Encryption
      • Quantum Computing
  • Home
  • Contact
  • Blog
  • Techie Tabby
  • QRAMM
  • Resources
    • Cryptography
    • Homomorphic Encryption
    • Quantum Computing

Overview

Emily (Stamm) Fane is a technology leader with a decade of experience in cryptography, quantum computing, and mathematics. In 2019, Emily co-founded CyberSecurity NonProfit (CSNP.org), an organization that has reached over 10,000 professionals through educational programs and community events. Under CSNP, Emily co-developed Quantum Readiness Assurance Maturity Model (QRAMM)—an open-source framework for evaluating post-quantum cryptography readiness (presented at DefCon CryptoVillage 2025).  She also published Techie Tabby, a children's book on digital safety.


At Point Wild, Emily is the manger of cryptography product strategy, developing technology for quantum-resistant cryptography. Previously at Niobium Microsystems, Emily led the applications team, partnering with a major cloud provider to build privacy-preserving solutions. Her prior roles ainclude cryptographic consulting at EY, quantum machine learning consulting and engineering at Protiviti, and cryptographic research and engineering at Allstate.

Research Publications

  • Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting E. Stamm, N. Smyth, L. O’Sullivan. Preprint, 2022 
  • An Investigation of (Nearly) Weakly Primes and Related Sieve Methods E. Stamm. Vassar College Thesis, Preprint, 2018 
  • Lacunary Eta-Quotients Modulo Powers of Primes T. Cotron, A. Michaelsen, E. Stamm, W. Zhu. Published in the Ramanujan Journal, 2020. 
  • When is a^n+1 the sum of two squares? G. Dresden, K. Hess, S. Islam, J. Rouse, A. Schmitt, E. Stamm, T. Warren, W. Yue. Published in mathematics journal Involve, 18. Vol. 12 (2019), No. 4, 585–605

Fiction Publications

  • Techie Tabby and the Ransomware Rabbit E. Fane, Published 2025.  When sneaky Ransomware Rabbit steals Techie Tabby’s treasured photo, it seems like all hope is lost. But with the help of clever BackUp Bear, Techie Tabby learns that protecting your digital treasures is easier than you think. Through this playful cybersecurity adventure, children — and parents! — discover how hackers use phishing and ransomware to hold important data hostage, and why backing up your data is one of the best defenses.

Projects

  • QRAMM (Quantum Readiness Assurance Maturity Model): open-source framework developed through CSNP to help organizations prepare for the post-quantum era. It guides enterprises in assessing cryptographic vulnerabilities, planning quantum-safe transitions, and aligning with NIST and ISO standards. Structured across four dimensions and five maturity levels, QRAMM includes assessment tools, implementation templates, and strategic guidance. Aimed at both technical and executive teams, it supports everything from asset discovery to enterprise rollout—with a public launch and toolkit expected in 2025. 
  • Cryptocurrency Forecasting with (Quantum) Machine Learning: Quantum computing PennyLane and Torch project for QHack comparing the performance of CNN, Hybrid CNN, and a custom variational quantum algorithm.
  • Variational State Transform: Quantum computing PennyLane project training a parametrized circuit to take the ith input state to the ith output state. 
  • RSA Bleichenbacher Attack: Python implementation of this CCA2 attack targeting RSA encryption with PKCS#1 v1.5 padding.

Resources

  • Cryptography: uses mathematical techniques to protect data integrity, confidentiality, and authenticity. Cryptography enables secure communication over untrusted networks through mechanisms like encryption, digital signatures, and secure key exchange. It underpins modern cybersecurity across nearly every domain — from safeguarding personal data and online banking to securing government infrastructure and cloud services.
  • Fully Homomorphic Encryption (FHE):  an advanced cryptographic technique that enables computations to be performed directly on encrypted data without needing to decrypt it first. This means sensitive information can remain confidential even during processing, allowing for secure data analysis in untrusted environments like cloud computing. FHE is particularly valuable in sectors requiring stringent data privacy, such as healthcare, finance, and government services. 
  • Quantum Computing: an emerging area of computation that leverages principles of quantum mechanics — such as superposition and entanglement — to perform certain calculations exponentially faster than classical computers. Quantum computing holds promise for solving problems in cryptography, optimization, and materials science that are intractable for today’s machines. It also poses a potential threat to current cryptographic systems, spurring urgent research into post-quantum security.

Organizations

  • CSNP (CyberSecurity Non-Profit): a 501(c)(3) organization dedicated to transforming global cybersecurity. We strive to create a secure and equitable digital world by providing accessible education, driving innovation, and empowering diverse communities.
  • Point Wild: a portfolio company that delivers data breach resilience, response, and remediation for consumer and enterprise endpoints.
  • Niobium Microsystems: a startup developing FHE software and hardware, specializing in Zero Trust Computing services. 

ConnecT

Copyright © 2025 Emily Fane - All Rights Reserved.

Powered by

  • Contact
  • Blog
  • Techie Tabby
  • QRAMM