Efficient Secure Two-Party Protocols: Techniques and