Emily Stamm

Emily StammEmily StammEmily Stamm

Emily Stamm

Emily StammEmily StammEmily Stamm
  • Home
  • Contact
  • Blog
  • Resources
    • Cryptography
    • Homomorphic Encryption
    • Quantum Computing
  • More
    • Home
    • Contact
    • Blog
    • Resources
      • Cryptography
      • Homomorphic Encryption
      • Quantum Computing
  • Home
  • Contact
  • Blog
  • Resources
    • Cryptography
    • Homomorphic Encryption
    • Quantum Computing

Overview

Innovative Technology Leader | Cryptography and Quantum

With a background at the intersection of cryptography, quantum computing, and cybersecurity, I’ve spent the last decade working across startups, global consultancies, and nonprofit initiatives to make advanced technology more usable, secure, and impactful.


At Niobium Microsystems, I currently lead applications engineering for fully homomorphic encryption (FHE), designing OpenFHE-based use cases, delivering technical workshops, and collaborating with a leading cloud provider on privacy-preserving search. I also help shape strategy by facilitating cross-functional planning and building internal knowledge-sharing systems for FHE research and product alignment.


Previously, I worked as a quantum computing consultant at Protiviti and a data protection consultant at EY, helping financial institutions assess cryptographic risk and quantum readiness. My technical experience spans PQC algorithm evaluation,  quantum machine learning, and attack simulation — including mask attacks on real-world hashing systems. At Allstate, I developed and implemented cryptographic solutions to enhance data security across the organization's platforms, including building secure encryption systems,anddeveloping and maintaining cryptographic standards for the organization.


As cofounder and former president of the global nonprofit CSNP, or CyberSecurity Non-Profit, I grew an international network for cybersecurity education and led programming that reached over 10,000 cybersecurity professionals and enthusiasts. We have produced over 150 blog posts, hosted 90 webinars and 40 in-person events, and partnered with organizations like Girl Scouts and Girls Dream Code to bring accessible cybersecurity education to communities around the world.

Explore

Organizations

  • CSNP (CyberSecurity Non-Profit): a 501(c)(3) organization dedicated to transforming global cybersecurity. We strive to create a secure and equitable digital world by providing accessible education, driving innovation, and empowering diverse communities.
  • Niobium Microsystems: a startup developing FHE software and hardware, specializing in Zero Trust Computing services. 

Resources

  • Cryptography: uses mathematical techniques to protect data integrity, confidentiality, and authenticity. Cryptography enables secure communication over untrusted networks through mechanisms like encryption, digital signatures, and secure key exchange. It underpins modern cybersecurity across nearly every domain — from safeguarding personal data and online banking to securing government infrastructure and cloud services.
  • Fully Homomorphic Encryption (FHE):  an advanced cryptographic technique that enables computations to be performed directly on encrypted data without needing to decrypt it first. This means sensitive information can remain confidential even during processing, allowing for secure data analysis in untrusted environments like cloud computing. FHE is particularly valuable in sectors requiring stringent data privacy, such as healthcare, finance, and government services. 
  • Quantum Computing: an emerging area of computation that leverages principles of quantum mechanics — such as superposition and entanglement — to perform certain calculations exponentially faster than classical computers. Quantum computing holds promise for solving problems in cryptography, optimization, and materials science that are intractable for today’s machines. It also poses a potential threat to current cryptographic systems, spurring urgent research into post-quantum security.

Publications

Cryptography

  • Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting E. Stamm, N. Smyth, L. O’Sullivan. Preprint, 2022 

Mathematics

  • An Investigation of (Nearly) Weakly Primes and Related Sieve Methods E. Stamm. Vassar College Thesis, Preprint, 2018 
  • Lacunary Eta-Quotients Modulo Powers of Primes T. Cotron, A. Michaelsen, E. Stamm, W. Zhu. Published in the Ramanujan Journal, 2020. 
  • When is a^n+1 the sum of two squares? G. Dresden, K. Hess, S. Islam, J. Rouse, A. Schmitt, E. Stamm, T. Warren, W. Yue. Published in mathematics journal Involve, 18. Vol. 12 (2019), No. 4, 585–605

ConnecT

Copyright © 2025 Emily Stamm - All Rights Reserved.

Powered by

  • Contact
  • Blog