Design and security analysis of two robust keyed hash functions based on chaotic neural networks