Text this: Engineering Secure Two-Party Computation Protocols