Two-round maliciously secure computation with super-polynomial simulation