“…Two-round MPC protocols in the malicious setting were first explored in [37,38], while recent years have witnessed exciting developments in two-round MPC [49,5,34,31,42,51,59,26,16,12,32,33,10,60,36,1,64,35,3,11,2,4,25]. The current state of the art can be summarized as follows:…”