A vault for what survives the break.
TRELYAN is a post-quantum inscription protocol on Algorand mainnet. 1,024 numbered Vault Cells — non-fungible Algorand Standard Assets — each carrying the irrevocable right to inscribe one immutable artifact under a Falcon-1024 signature, verified on-chain at consensus by the hash-and-sign lattice scheme NIST standardized as FIPS 206 for the world after Q-Day.
A protocol with four moving parts.
TRELYAN is not a token launch with a story bolted on. It is a four-component structure whose properties compose into the one the project's name carries: permanence on a substrate that survives the cryptographic break.
Algorand mainnet
Pure Proof-of-Stake under cryptographic sortition. 2.8-second deterministic finality. The Falcon-1024 verification opcode falcon_verify is native TEAL, live in production at consensus since the November 2025 protocol upgrade — the only Layer-1 where post-quantum signature verification is a primitive rather than a wrapper.
Falcon-1024
NIST FIPS 206. Lattice hash-and-sign over NTRU lattices in the Gentry-Peikert-Vaikuntanathan framework, sampled by the fast-Fourier sampler over ℤq[x] / (xn+1). Security reduces to the worst-case hardness of the Short Integer Solution problem; signatures are 1,280 bytes — small enough to be verified at consensus.
1,024 Vault Cells
Each Cell is a non-fungible Algorand Standard Asset whose only substantive right is to inscribe one immutable artifact of payload ≤ 4 KB, bound to the Cell by Falcon signature. Three lifecycle states — Sealed → Inscribed → Released — enforced in the contract, not by policy.
Swiss Stiftung
The foundation forms under the Swiss Civil Code, articles 80 to 89-bis, registered in Zug. Counsel of record is LEXR. Founder personal capital is zero by deliberate design. The discipline is in writing before the protocol exists.
Permanence is an engineering claim, not a marketing one.
A digital signature whose verifying key can be inverted by an unknown future quantum computer is not a signature in any meaningful sense; it is a deferred forgery. A non-fungible token whose authenticity depends on the discrete-logarithm assumption is one Shor execution away from indistinguishability from its own counterfeit. The work of making these problems solved problems has already been done — by NIST, in FIPS 205, 206, and 204, and by the academic cryptography community over the two decades that produced them. The deployment is what is missing.
TRELYAN is the deployment, on the only Layer-1 where the verification primitives required to make the substitution complete are already live at consensus.