Secure Computation in the Real World