Mycelium Entropy can generate several keys from a single insertion, when instructed by pressing the button. An algorithm based on state of the art cryptographic practice ensures that all generated keys are unpredictable, even though the amount of SRAM entropy obtained at power-up is limited. This algorithm is practically the same as the well audited and trusted child key derivation function of hierarchical deterministic wallets as specified in BIP-32, except that the entropy pool (chain code) is also fed from the secondary random sources for each new key.
Have more questions? Submit a request