The invention relates to a method for protecting one or more computer systems
using the same secret key (Ks) cryptographic algorithm, characterized in that the
way in which said calculation is performed depends, for each computer system and
for each secret key, on secret data (Ds) stored in a secret area of the computer
system or systems.