Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries Posted June 18, 2016 by Alon