Feasibility, Efficiency, and Robustness of Secure Computation