A secured method of cryptographic computation to generate output data from
input data and from a secret key includes a derived key scheduling step
to provide a derived key from the secret key according to a known key
scheduling operation. The method also includes a masking step, performed
before the derived key scheduling step, to mask the secret key so that
the derived scheduled key is different at each implementation of the
method. The present method and component can be used in transfer type
applications, such as bank type applications.