At the time, he was using computers to look at similar equations with different exponents ... you use a computer to solve a particularly difficult mathematical cryptography problem.
Some results have been hidden because they may be inaccessible to you